Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-3245 (GCVE-0-2009-3245)
Vulnerability from cvelistv5
- n/a
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:22:24.020Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2010-0916",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0916"
          },
          {
            "name": "42724",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42724"
          },
          {
            "name": "oval:org.mitre.oval:def:11738",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738"
          },
          {
            "name": "39461",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39461"
          },
          {
            "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_1_0_0-stable: openssl/crypto/bn/ bn_div.c bn_gf...",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "FEDORA-2010-5357",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
          },
          {
            "name": "SSA:2010-060-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "oval:org.mitre.oval:def:6640",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640"
          },
          {
            "name": "HPSBOV02540",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2"
          },
          {
            "name": "[openssl-cvs] 20100223 OpenSSL: openssl/crypto/bn/ bn_div.c bn_gf2m.c openssl/crypto/ec...",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2"
          },
          {
            "name": "38761",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38761"
          },
          {
            "name": "SUSE-SR:2010:013",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
          },
          {
            "name": "38562",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/38562"
          },
          {
            "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9790",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790"
          },
          {
            "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_0_9_8-stable: openssl/ CHANGES openssl/crypto/b...",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2"
          },
          {
            "name": "RHSA-2010:0977",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
          },
          {
            "name": "ADV-2010-0839",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0839"
          },
          {
            "name": "MDVSA-2010:076",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
          },
          {
            "name": "HPSBUX02517",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
          },
          {
            "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
          },
          {
            "name": "USN-1003-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1003-1"
          },
          {
            "name": "39932",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39932"
          },
          {
            "name": "ADV-2010-0933",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0933"
          },
          {
            "name": "RHSA-2011:0896",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
          },
          {
            "name": "SSRT100058",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
          },
          {
            "name": "ADV-2010-1216",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1216"
          },
          {
            "name": "42733",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42733"
          },
          {
            "name": "37291",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37291"
          },
          {
            "name": "FEDORA-2010-5744",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-25T00:06:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2010-0916",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0916"
        },
        {
          "name": "42724",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42724"
        },
        {
          "name": "oval:org.mitre.oval:def:11738",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738"
        },
        {
          "name": "39461",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39461"
        },
        {
          "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_1_0_0-stable: openssl/crypto/bn/ bn_div.c bn_gf...",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4723"
        },
        {
          "name": "FEDORA-2010-5357",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
        },
        {
          "name": "SSA:2010-060-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049"
        },
        {
          "name": "APPLE-SA-2011-06-23-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
        },
        {
          "name": "oval:org.mitre.oval:def:6640",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640"
        },
        {
          "name": "HPSBOV02540",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2"
        },
        {
          "name": "[openssl-cvs] 20100223 OpenSSL: openssl/crypto/bn/ bn_div.c bn_gf2m.c openssl/crypto/ec...",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2"
        },
        {
          "name": "38761",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38761"
        },
        {
          "name": "SUSE-SR:2010:013",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
        },
        {
          "name": "38562",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/38562"
        },
        {
          "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
        },
        {
          "name": "oval:org.mitre.oval:def:9790",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790"
        },
        {
          "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_0_9_8-stable: openssl/ CHANGES openssl/crypto/b...",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2"
        },
        {
          "name": "RHSA-2010:0977",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
        },
        {
          "name": "ADV-2010-0839",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0839"
        },
        {
          "name": "MDVSA-2010:076",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
        },
        {
          "name": "HPSBUX02517",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
        },
        {
          "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
        },
        {
          "name": "USN-1003-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1003-1"
        },
        {
          "name": "39932",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39932"
        },
        {
          "name": "ADV-2010-0933",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0933"
        },
        {
          "name": "RHSA-2011:0896",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
        },
        {
          "name": "SSRT100058",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
        },
        {
          "name": "ADV-2010-1216",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1216"
        },
        {
          "name": "42733",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42733"
        },
        {
          "name": "37291",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37291"
        },
        {
          "name": "FEDORA-2010-5744",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3245",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2010-0916",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0916"
            },
            {
              "name": "42724",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42724"
            },
            {
              "name": "oval:org.mitre.oval:def:11738",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738"
            },
            {
              "name": "39461",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39461"
            },
            {
              "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_1_0_0-stable: openssl/crypto/bn/ bn_div.c bn_gf...",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "FEDORA-2010-5357",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
            },
            {
              "name": "SSA:2010-060-02",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "oval:org.mitre.oval:def:6640",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640"
            },
            {
              "name": "HPSBOV02540",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2"
            },
            {
              "name": "[openssl-cvs] 20100223 OpenSSL: openssl/crypto/bn/ bn_div.c bn_gf2m.c openssl/crypto/ec...",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2"
            },
            {
              "name": "38761",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38761"
            },
            {
              "name": "SUSE-SR:2010:013",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
            },
            {
              "name": "38562",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/38562"
            },
            {
              "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
              "refsource": "MLIST",
              "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
            },
            {
              "name": "oval:org.mitre.oval:def:9790",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790"
            },
            {
              "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_0_9_8-stable: openssl/ CHANGES openssl/crypto/b...",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2"
            },
            {
              "name": "RHSA-2010:0977",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
            },
            {
              "name": "ADV-2010-0839",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0839"
            },
            {
              "name": "MDVSA-2010:076",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
            },
            {
              "name": "HPSBUX02517",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
            },
            {
              "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
              "refsource": "MLIST",
              "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
            },
            {
              "name": "USN-1003-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1003-1"
            },
            {
              "name": "39932",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39932"
            },
            {
              "name": "ADV-2010-0933",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0933"
            },
            {
              "name": "RHSA-2011:0896",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
            },
            {
              "name": "SSRT100058",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
            },
            {
              "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA50",
              "refsource": "CONFIRM",
              "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
            },
            {
              "name": "ADV-2010-1216",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1216"
            },
            {
              "name": "42733",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42733"
            },
            {
              "name": "37291",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37291"
            },
            {
              "name": "FEDORA-2010-5744",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
            },
            {
              "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc",
              "refsource": "CONFIRM",
              "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
            },
            {
              "name": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3245",
    "datePublished": "2010-03-05T19:00:00",
    "dateReserved": "2009-09-18T00:00:00",
    "dateUpdated": "2024-08-07T06:22:24.020Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-3245\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-03-05T19:30:00.343\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.\"},{\"lang\":\"es\",\"value\":\"OpenSSL en versiones anterioes a v0.9.8m cuando recibe un valor de retorno NULL de la funcion bn_wexpand hace una llamada a (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, y (4) engines/e_ubsec.c, lo que tiene un impacto inespecifico y vectores de ataque dependientes del contexto.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.9.8l\",\"matchCriteriaId\":\"81FB3B26-CC83-4FA5-BDE1-05F35AB99741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4E446D-B9D3-45F2-9722-B41FA14A6C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4EA988-FC80-4170-8933-7C6663731981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F8F53B-24A1-4877-B16E-F1917C4E4E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75D3ACD5-905F-42BB-BE1A-8382E9D823BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766EA6F2-7FA4-4713-9859-9971CCD2FDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB38AEA-BAF0-4920-9A71-747C24444770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F33EA2B-DE15-4695-A383-7A337AC38908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261EE631-AB43-44FE-B02A-DFAAB8D35927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0E0BBF-D0BE-41A7-B9BB-C28F01000BC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1365ED-4651-4AB2-A64B-43782EA2F0E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC82690C-DCED-47BA-AA93-4D0C9E95B806\"}]}]}],\"references\":[{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37291\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/38761\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/39461\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/39932\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/42724\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/42733\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT4723\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:076\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0977.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0896.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/38562\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1003-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0839\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0916\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0933\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1216\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA50\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/39461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/39932\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT4723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:076\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0977.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0896.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/38562\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1003-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0839\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0916\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0933\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA50\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-3245\\n\\nThis issue was fixed in openssl packages in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2010-0162.html\\n\\nThis issue was fixed in openssl096b packages in Red Hat Enterprise Linux 3 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0173.html\\n\\nThe Red Hat Security Response Team has rated this issue as having low security impact on openssl packages in Red Hat Enterprise Linux 3 and 4, a future update may address this flaw.\",\"lastModified\":\"2010-03-25T00:00:00\"}]}}"
  }
}
  rhsa-2010_0977
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nA ciphersuite downgrade flaw was found in the OpenSSL SSL/TLS server code.\nA remote attacker could possibly use this flaw to change the ciphersuite\nassociated with a cached session stored on the server, if the server\nenabled the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option, possibly\nforcing the client to use a weaker ciphersuite after resuming the session.\n(CVE-2010-4180, CVE-2008-7270)\n\nNote: With this update, setting the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG\noption has no effect and this bug workaround can no longer be enabled.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could possibly crash an application using the\nOpenSSL library and its UBSEC hardware engine support. (CVE-2009-3245)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0977",
        "url": "https://access.redhat.com/errata/RHSA-2010:0977"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "external",
        "summary": "659462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
      },
      {
        "category": "external",
        "summary": "660650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0977.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2024-11-22T04:21:49+00:00",
      "generator": {
        "date": "2024-11-22T04:21:49+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0977",
      "initial_release_date": "2010-12-13T18:13:00+00:00",
      "revision_history": [
        {
          "date": "2010-12-13T18:13:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-12-13T13:14:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T04:21:49+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-7270",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "660650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "RHBZ#660650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-7270",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack"
    },
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2010-4180",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "659462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "RHBZ#659462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4180",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack"
    }
  ]
}
  rhsa-2010_0162
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw by implementing the\nTLS Renegotiation Indication Extension, as defined in RFC 5746.\n(CVE-2009-3555)\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nA missing return value check flaw was discovered in OpenSSL, that could\npossibly cause OpenSSL to call a Kerberos library function with invalid\narguments, resulting in a NULL pointer dereference crash in the MIT\nKerberos library. In certain configurations, a remote attacker could use\nthis flaw to crash a TLS/SSL server using OpenSSL by requesting Kerberos\ncipher suites during the TLS handshake. (CVE-2010-0433)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0162",
        "url": "https://access.redhat.com/errata/RHSA-2010:0162"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "567711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
      },
      {
        "category": "external",
        "summary": "569774",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0162.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2024-11-22T03:16:27+00:00",
      "generator": {
        "date": "2024-11-22T03:16:27+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0162",
      "initial_release_date": "2010-03-25T08:52:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T08:52:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T04:52:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:16:27+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                  "product_id": "5Client-Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-0433",
      "discovery_date": "2010-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "569774"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: crash caused by a missing krb5_sname_to_principal() return value check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "RHBZ#569774",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0433",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: crash caused by a missing krb5_sname_to_principal() return value check"
    }
  ]
}
  rhsa-2010:0440
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated rhev-hypervisor package that fixes two security issues and\nseveral bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The rhev-hypervisor package provides a Red Hat Enterprise Virtualization\n(RHEV) Hypervisor ISO disk image. The RHEV Hypervisor is a dedicated\nKernel-based Virtual Machine (KVM) hypervisor. It includes everything\nnecessary to run and manage virtual machines: A subset of the Red Hat\nEnterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: RHEV Hypervisor is only available for the Intel 64 and AMD64\narchitectures with virtualization extensions.\n\nIt was discovered that OpenSSL did not always check the return value of\nthe bn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw in openssl, nss, and\ngnutls by implementing the TLS Renegotiation Indication Extension, as\ndefined in RFC 5746. (CVE-2009-3555)\n\nThis updated package provides updated components that include fixes for\nsecurity issues; however, these issues have no security impact for RHEV\nHypervisor. These fixes are for kernel issues CVE-2009-4307, CVE-2010-0727,\nCVE-2009-4027, and CVE-2010-1188; cpio issues CVE-2010-0624 and\nCVE-2007-4476; gnutls issue CVE-2009-2409; openssl issue CVE-2010-0433; and\ntar issues CVE-2010-0624 and CVE-2007-4476.\n\nThis update also fixes the following bugs:\n\n* bridged network interfaces using the bnx2x, mlx4_en, enic and s2io\ndrivers had Large Receive Offload (LRO) enabled by default. This caused\nsignificantly degraded network I/O performance. LRO has been disabled for\nall network interface drivers which have LRO enabled by default in Red Hat\nEnterprise Linux 5. With this change, network I/O performance is\nsignificantly improved. (BZ#576374, BZ#579730)\n\n* RHEV Hypervisor supported IPv6, but as this is not used to communicate\nwith the RHEV Manager, it is superfluous. Support for IPv6 has now been\ndisabled in RHEV Hypervisor. (BZ#577300)\n\n* for VLAN interfaces, the hardware (MAC) address of the interface was set\nonly in the VLAN ifcfg script, not in the physical interface ifcfg script.\nThis caused network interfaces with VLAN tags to intermittently fail on\nboot. The MAC address is now set in the ifcfg script for the underlying\nphysical interface. Network interfaces with VLAN tags now work consistently\nbetween reboots. (BZ#581876)\n\n* the hypervisor would hang on reboot after repeated upgrade operations,\ndue to GRUB accessing the /boot file system before it was flushed. The\n/boot file system is now remounted before GRUB accesses it. (BZ#591111)\n\nAs RHEV Hypervisor is based on KVM, the bug fixes from the KVM update\nRHBA-2010:0434 have been included in this update. Also included are the bug\nfixes from the RHEV Manager Agent (VDSM) update RHBA-2010:0435.\n\nKVM: https://rhn.redhat.com/errata/RHBA-2010-0434.html\nVDSM: https://rhn.redhat.com/errata/RHBA-2010-0435.html\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which corrects these issues.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0440",
        "url": "https://access.redhat.com/errata/RHSA-2010:0440"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0440.json"
      }
    ],
    "title": "Red Hat Security Advisory: rhev-hypervisor security and bug fix update",
    "tracking": {
      "current_release_date": "2025-09-26T03:04:35+00:00",
      "generator": {
        "date": "2025-09-26T03:04:35+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2010:0440",
      "initial_release_date": "2010-05-25T20:41:00+00:00",
      "revision_history": [
        {
          "date": "2010-05-25T20:41:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-05-25T16:41:48+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-26T03:04:35+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Virtualization Hypervisor 5",
                "product": {
                  "name": "Red Hat Enterprise Virtualization Hypervisor 5",
                  "product_id": "5Server-RHEV-Hypervisor-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                "product": {
                  "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                  "product_id": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.12.1.el5_4rhev2_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                "product": {
                  "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_id": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.12.1.el5_4rhev2_1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                "product": {
                  "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_id": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor-pxe@5.4-2.1.12.1.el5_4rhev2_1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        },
        "product_reference": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src"
        },
        "product_reference": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        },
        "product_reference": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-05-25T20:41:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0440"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-05-25T20:41:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0440"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    }
  ]
}
  RHSA-2010:0440
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated rhev-hypervisor package that fixes two security issues and\nseveral bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The rhev-hypervisor package provides a Red Hat Enterprise Virtualization\n(RHEV) Hypervisor ISO disk image. The RHEV Hypervisor is a dedicated\nKernel-based Virtual Machine (KVM) hypervisor. It includes everything\nnecessary to run and manage virtual machines: A subset of the Red Hat\nEnterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: RHEV Hypervisor is only available for the Intel 64 and AMD64\narchitectures with virtualization extensions.\n\nIt was discovered that OpenSSL did not always check the return value of\nthe bn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw in openssl, nss, and\ngnutls by implementing the TLS Renegotiation Indication Extension, as\ndefined in RFC 5746. (CVE-2009-3555)\n\nThis updated package provides updated components that include fixes for\nsecurity issues; however, these issues have no security impact for RHEV\nHypervisor. These fixes are for kernel issues CVE-2009-4307, CVE-2010-0727,\nCVE-2009-4027, and CVE-2010-1188; cpio issues CVE-2010-0624 and\nCVE-2007-4476; gnutls issue CVE-2009-2409; openssl issue CVE-2010-0433; and\ntar issues CVE-2010-0624 and CVE-2007-4476.\n\nThis update also fixes the following bugs:\n\n* bridged network interfaces using the bnx2x, mlx4_en, enic and s2io\ndrivers had Large Receive Offload (LRO) enabled by default. This caused\nsignificantly degraded network I/O performance. LRO has been disabled for\nall network interface drivers which have LRO enabled by default in Red Hat\nEnterprise Linux 5. With this change, network I/O performance is\nsignificantly improved. (BZ#576374, BZ#579730)\n\n* RHEV Hypervisor supported IPv6, but as this is not used to communicate\nwith the RHEV Manager, it is superfluous. Support for IPv6 has now been\ndisabled in RHEV Hypervisor. (BZ#577300)\n\n* for VLAN interfaces, the hardware (MAC) address of the interface was set\nonly in the VLAN ifcfg script, not in the physical interface ifcfg script.\nThis caused network interfaces with VLAN tags to intermittently fail on\nboot. The MAC address is now set in the ifcfg script for the underlying\nphysical interface. Network interfaces with VLAN tags now work consistently\nbetween reboots. (BZ#581876)\n\n* the hypervisor would hang on reboot after repeated upgrade operations,\ndue to GRUB accessing the /boot file system before it was flushed. The\n/boot file system is now remounted before GRUB accesses it. (BZ#591111)\n\nAs RHEV Hypervisor is based on KVM, the bug fixes from the KVM update\nRHBA-2010:0434 have been included in this update. Also included are the bug\nfixes from the RHEV Manager Agent (VDSM) update RHBA-2010:0435.\n\nKVM: https://rhn.redhat.com/errata/RHBA-2010-0434.html\nVDSM: https://rhn.redhat.com/errata/RHBA-2010-0435.html\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which corrects these issues.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0440",
        "url": "https://access.redhat.com/errata/RHSA-2010:0440"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0440.json"
      }
    ],
    "title": "Red Hat Security Advisory: rhev-hypervisor security and bug fix update",
    "tracking": {
      "current_release_date": "2025-09-26T03:04:35+00:00",
      "generator": {
        "date": "2025-09-26T03:04:35+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2010:0440",
      "initial_release_date": "2010-05-25T20:41:00+00:00",
      "revision_history": [
        {
          "date": "2010-05-25T20:41:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-05-25T16:41:48+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-26T03:04:35+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Virtualization Hypervisor 5",
                "product": {
                  "name": "Red Hat Enterprise Virtualization Hypervisor 5",
                  "product_id": "5Server-RHEV-Hypervisor-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                "product": {
                  "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                  "product_id": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.12.1.el5_4rhev2_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                "product": {
                  "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_id": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.12.1.el5_4rhev2_1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                "product": {
                  "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_id": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor-pxe@5.4-2.1.12.1.el5_4rhev2_1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        },
        "product_reference": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src"
        },
        "product_reference": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        },
        "product_reference": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-05-25T20:41:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0440"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-05-25T20:41:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0440"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    }
  ]
}
  rhsa-2010:0977
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nA ciphersuite downgrade flaw was found in the OpenSSL SSL/TLS server code.\nA remote attacker could possibly use this flaw to change the ciphersuite\nassociated with a cached session stored on the server, if the server\nenabled the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option, possibly\nforcing the client to use a weaker ciphersuite after resuming the session.\n(CVE-2010-4180, CVE-2008-7270)\n\nNote: With this update, setting the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG\noption has no effect and this bug workaround can no longer be enabled.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could possibly crash an application using the\nOpenSSL library and its UBSEC hardware engine support. (CVE-2009-3245)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0977",
        "url": "https://access.redhat.com/errata/RHSA-2010:0977"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "external",
        "summary": "659462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
      },
      {
        "category": "external",
        "summary": "660650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0977.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:19:02+00:00",
      "generator": {
        "date": "2025-10-09T13:19:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0977",
      "initial_release_date": "2010-12-13T18:13:00+00:00",
      "revision_history": [
        {
          "date": "2010-12-13T18:13:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-12-13T13:14:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:19:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-7270",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "660650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "RHBZ#660650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-7270",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack"
    },
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2010-4180",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "659462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "RHBZ#659462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4180",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack"
    }
  ]
}
  rhsa-2010:0162
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw by implementing the\nTLS Renegotiation Indication Extension, as defined in RFC 5746.\n(CVE-2009-3555)\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nA missing return value check flaw was discovered in OpenSSL, that could\npossibly cause OpenSSL to call a Kerberos library function with invalid\narguments, resulting in a NULL pointer dereference crash in the MIT\nKerberos library. In certain configurations, a remote attacker could use\nthis flaw to crash a TLS/SSL server using OpenSSL by requesting Kerberos\ncipher suites during the TLS handshake. (CVE-2010-0433)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0162",
        "url": "https://access.redhat.com/errata/RHSA-2010:0162"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "567711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
      },
      {
        "category": "external",
        "summary": "569774",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0162.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:29:02+00:00",
      "generator": {
        "date": "2025-10-09T13:29:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0162",
      "initial_release_date": "2010-03-25T08:52:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T08:52:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T04:52:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:29:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                  "product_id": "5Client-Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-0433",
      "discovery_date": "2010-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "569774"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: crash caused by a missing krb5_sname_to_principal() return value check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "RHBZ#569774",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0433",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: crash caused by a missing krb5_sname_to_principal() return value check"
    }
  ]
}
  RHSA-2010:0173
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl096b packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nAll openssl096b users should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. For the update to take\neffect, all programs using the openssl096b library must be restarted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0173",
        "url": "https://access.redhat.com/errata/RHSA-2010:0173"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-26039",
        "url": "http://kbase.redhat.com/faq/docs/DOC-26039"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0173.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl096b security update",
    "tracking": {
      "current_release_date": "2025-09-26T03:04:22+00:00",
      "generator": {
        "date": "2025-09-26T03:04:22+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2010:0173",
      "initial_release_date": "2010-03-25T09:51:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T09:51:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T05:58:33+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-26T03:04:22+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 3",
                  "product_id": "3AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Desktop version 3",
                "product": {
                  "name": "Red Hat Desktop version 3",
                  "product_id": "3Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 3",
                  "product_id": "3ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 3",
                  "product_id": "3WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.ia64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.ia64",
                  "product_id": "openssl096b-0:0.9.6b-16.50.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.i386",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.i386",
                  "product_id": "openssl096b-0:0.9.6b-16.50.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.x86_64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.x86_64",
                  "product_id": "openssl096b-0:0.9.6b-16.50.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.src",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.src",
                  "product_id": "openssl096b-0:0.9.6b-16.50.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.ppc",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.ppc",
                  "product_id": "openssl096b-0:0.9.6b-16.50.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.s390",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.s390",
                  "product_id": "openssl096b-0:0.9.6b-16.50.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:openssl096b-0:0.9.6b-16.50.i386",
          "3AS:openssl096b-0:0.9.6b-16.50.ia64",
          "3AS:openssl096b-0:0.9.6b-16.50.ppc",
          "3AS:openssl096b-0:0.9.6b-16.50.s390",
          "3AS:openssl096b-0:0.9.6b-16.50.src",
          "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
          "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
          "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
          "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
          "3Desktop:openssl096b-0:0.9.6b-16.50.src",
          "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3ES:openssl096b-0:0.9.6b-16.50.i386",
          "3ES:openssl096b-0:0.9.6b-16.50.ia64",
          "3ES:openssl096b-0:0.9.6b-16.50.ppc",
          "3ES:openssl096b-0:0.9.6b-16.50.s390",
          "3ES:openssl096b-0:0.9.6b-16.50.src",
          "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3WS:openssl096b-0:0.9.6b-16.50.i386",
          "3WS:openssl096b-0:0.9.6b-16.50.ia64",
          "3WS:openssl096b-0:0.9.6b-16.50.ppc",
          "3WS:openssl096b-0:0.9.6b-16.50.s390",
          "3WS:openssl096b-0:0.9.6b-16.50.src",
          "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T09:51:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:openssl096b-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-0:0.9.6b-16.50.src",
            "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-0:0.9.6b-16.50.src",
            "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-0:0.9.6b-16.50.src",
            "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-0:0.9.6b-16.50.src",
            "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0173"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:openssl096b-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-0:0.9.6b-16.50.src",
            "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-0:0.9.6b-16.50.src",
            "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-0:0.9.6b-16.50.src",
            "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-0:0.9.6b-16.50.src",
            "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    }
  ]
}
  rhsa-2010_0173
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl096b packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nAll openssl096b users should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. For the update to take\neffect, all programs using the openssl096b library must be restarted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0173",
        "url": "https://access.redhat.com/errata/RHSA-2010:0173"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-26039",
        "url": "http://kbase.redhat.com/faq/docs/DOC-26039"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0173.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl096b security update",
    "tracking": {
      "current_release_date": "2024-11-14T10:48:32+00:00",
      "generator": {
        "date": "2024-11-14T10:48:32+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2010:0173",
      "initial_release_date": "2010-03-25T09:51:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T09:51:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T05:58:33+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T10:48:32+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 3",
                  "product_id": "3AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Desktop version 3",
                "product": {
                  "name": "Red Hat Desktop version 3",
                  "product_id": "3Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 3",
                  "product_id": "3ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 3",
                  "product_id": "3WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.ia64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.ia64",
                  "product_id": "openssl096b-0:0.9.6b-16.50.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.i386",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.i386",
                  "product_id": "openssl096b-0:0.9.6b-16.50.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.x86_64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.x86_64",
                  "product_id": "openssl096b-0:0.9.6b-16.50.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.src",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.src",
                  "product_id": "openssl096b-0:0.9.6b-16.50.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.ppc",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.ppc",
                  "product_id": "openssl096b-0:0.9.6b-16.50.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.s390",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.s390",
                  "product_id": "openssl096b-0:0.9.6b-16.50.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:openssl096b-0:0.9.6b-16.50.i386",
          "3AS:openssl096b-0:0.9.6b-16.50.ia64",
          "3AS:openssl096b-0:0.9.6b-16.50.ppc",
          "3AS:openssl096b-0:0.9.6b-16.50.s390",
          "3AS:openssl096b-0:0.9.6b-16.50.src",
          "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
          "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
          "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
          "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
          "3Desktop:openssl096b-0:0.9.6b-16.50.src",
          "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3ES:openssl096b-0:0.9.6b-16.50.i386",
          "3ES:openssl096b-0:0.9.6b-16.50.ia64",
          "3ES:openssl096b-0:0.9.6b-16.50.ppc",
          "3ES:openssl096b-0:0.9.6b-16.50.s390",
          "3ES:openssl096b-0:0.9.6b-16.50.src",
          "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3WS:openssl096b-0:0.9.6b-16.50.i386",
          "3WS:openssl096b-0:0.9.6b-16.50.ia64",
          "3WS:openssl096b-0:0.9.6b-16.50.ppc",
          "3WS:openssl096b-0:0.9.6b-16.50.s390",
          "3WS:openssl096b-0:0.9.6b-16.50.src",
          "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T09:51:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:openssl096b-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-0:0.9.6b-16.50.src",
            "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-0:0.9.6b-16.50.src",
            "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-0:0.9.6b-16.50.src",
            "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-0:0.9.6b-16.50.src",
            "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0173"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:openssl096b-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-0:0.9.6b-16.50.src",
            "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-0:0.9.6b-16.50.src",
            "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-0:0.9.6b-16.50.src",
            "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-0:0.9.6b-16.50.src",
            "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    }
  ]
}
  rhsa-2011_0896
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat\nCustomer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and\nMicrosoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "JBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications.\n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and\nMicrosoft Windows, this release serves as a replacement for JBoss\nEnterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to\nthe Release Notes, linked in the References, for more information.\n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host\u0027s work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages.\n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\nA flaw was discovered in the way the mod_proxy_http module of the Apache\nHTTP Server handled the timeouts of requests forwarded by a reverse proxy\nto the back-end server. In some configurations, the proxy could return\na response intended for another user under certain timeout conditions,\npossibly leading to information disclosure. Note: This issue only affected\nhttpd running on the Windows operating system. (CVE-2010-2068)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the \u0027*\u0027 wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. (CVE-2010-1623)\n\nThe following flaws were corrected in the packages for Solaris and Windows.\nUpdates for Red Hat Enterprise Linux can be downloaded from the Red Hat\nNetwork.\n\nMultiple flaws in OpenSSL, which could possibly cause a crash, code\nexecution, or a change of session parameters, have been corrected.\n(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)\n\nTwo denial of service flaws were corrected in Expat. (CVE-2009-3560,\nCVE-2009-3720)\n\nAn X.509 certificate verification flaw was corrected in OpenLDAP.\n(CVE-2009-3767)\n\nMore information about these flaws is available from the CVE links in the\nReferences.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:0896",
        "url": "https://access.redhat.com/errata/RHSA-2011:0896"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html",
        "url": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=1.0.2",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=1.0.2"
      },
      {
        "category": "external",
        "summary": "530715",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530715"
      },
      {
        "category": "external",
        "summary": "531697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
      },
      {
        "category": "external",
        "summary": "533174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "external",
        "summary": "585331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331"
      },
      {
        "category": "external",
        "summary": "618189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189"
      },
      {
        "category": "external",
        "summary": "632994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632994"
      },
      {
        "category": "external",
        "summary": "640281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281"
      },
      {
        "category": "external",
        "summary": "656246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246"
      },
      {
        "category": "external",
        "summary": "659462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
      },
      {
        "category": "external",
        "summary": "660650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
      },
      {
        "category": "external",
        "summary": "675786",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786"
      },
      {
        "category": "external",
        "summary": "675792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792"
      },
      {
        "category": "external",
        "summary": "703390",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0896.json"
      }
    ],
    "title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update",
    "tracking": {
      "current_release_date": "2024-11-22T04:47:58+00:00",
      "generator": {
        "date": "2024-11-22T04:47:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2011:0896",
      "initial_release_date": "2011-06-22T23:14:00+00:00",
      "revision_history": [
        {
          "date": "2011-06-22T23:14:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-06-22T19:16:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T04:47:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0",
                  "product_id": "Red Hat JBoss Web Server 1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-7270",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "660650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "RHBZ#660650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-7270",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack"
    },
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3560",
      "discovery_date": "2009-11-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533174"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "RHBZ#533174",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3560",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560"
        }
      ],
      "release_date": "2009-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3720",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "531697"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "RHBZ#531697",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720"
        }
      ],
      "release_date": "2009-01-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3767",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530715"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenLDAP: Doesn\u0027t properly handle NULL character in subject Common Name",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was addressed in the openldap packages as shipped with Red Hat Enterprise Linux 5 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0198.html and https://rhn.redhat.com/errata/RHSA-2010-0543.html respectively.\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future openldap update may address this flaw in Red Hat Enterprise Linux 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3767"
        },
        {
          "category": "external",
          "summary": "RHBZ#530715",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530715"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3767"
        }
      ],
      "release_date": "2009-08-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenLDAP: Doesn\u0027t properly handle NULL character in subject Common Name"
    },
    {
      "cve": "CVE-2010-1157",
      "discovery_date": "2010-04-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "585331"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server\u0027s hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information disclosure in authentication headers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1157"
        },
        {
          "category": "external",
          "summary": "RHBZ#585331",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1157",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157"
        }
      ],
      "release_date": "2010-04-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: information disclosure in authentication headers"
    },
    {
      "cve": "CVE-2010-1452",
      "discovery_date": "2010-07-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "618189"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1452"
        },
        {
          "category": "external",
          "summary": "RHBZ#618189",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1452",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1452",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1452"
        }
      ],
      "release_date": "2010-07-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments"
    },
    {
      "cve": "CVE-2010-1623",
      "discovery_date": "2010-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "640281"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr-util: high memory consumption in apr_brigade_split_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1623"
        },
        {
          "category": "external",
          "summary": "RHBZ#640281",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1623",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1623"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1623",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1623"
        }
      ],
      "release_date": "2010-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr-util: high memory consumption in apr_brigade_split_line()"
    },
    {
      "cve": "CVE-2010-2068",
      "discovery_date": "2010-09-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "632994"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "(mod_proxy): Sensitive response disclosure due improper handling of timeouts",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2068"
        },
        {
          "category": "external",
          "summary": "RHBZ#632994",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632994"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2068"
        }
      ],
      "release_date": "2010-06-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "(mod_proxy): Sensitive response disclosure due improper handling of timeouts"
    },
    {
      "cve": "CVE-2010-3718",
      "discovery_date": "2011-02-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "675792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: file permission bypass flaw",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-3718"
        },
        {
          "category": "external",
          "summary": "RHBZ#675792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3718",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3718",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3718"
        }
      ],
      "release_date": "2011-02-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: file permission bypass flaw"
    },
    {
      "cve": "CVE-2010-4172",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2010-11-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "656246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: cross-site-scripting vulnerability in the manager application",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4172"
        },
        {
          "category": "external",
          "summary": "RHBZ#656246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4172",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4172",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4172"
        }
      ],
      "release_date": "2010-11-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: cross-site-scripting vulnerability in the manager application"
    },
    {
      "cve": "CVE-2010-4180",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "659462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "RHBZ#659462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4180",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack"
    },
    {
      "cve": "CVE-2011-0013",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2011-02-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "675786"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: XSS vulnerability in HTML Manager interface",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0013"
        },
        {
          "category": "external",
          "summary": "RHBZ#675786",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0013",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0013",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0013"
        }
      ],
      "release_date": "2011-01-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: XSS vulnerability in HTML Manager interface"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maksymilian Arciemowicz"
          ]
        }
      ],
      "cve": "CVE-2011-0419",
      "discovery_date": "2011-05-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "703390"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr: unconstrained recursion in apr_fnmatch",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0419"
        },
        {
          "category": "external",
          "summary": "RHBZ#703390",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0419",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0419",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0419"
        }
      ],
      "release_date": "2011-05-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        },
        {
          "category": "workaround",
          "details": "mod_autoindex can be configured to ignore request query arguments provided by the client by adding IgnoreClient option to the IndexOptions directive:\n\nhttp://httpd.apache.org/docs/2.2/mod/mod_autoindex.html#indexoptions.ignoreclient",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr: unconstrained recursion in apr_fnmatch"
    },
    {
      "cve": "CVE-2012-4557",
      "discovery_date": "2012-10-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "871685"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of httpd as shipped with Red Hat Enterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-4557"
        },
        {
          "category": "external",
          "summary": "RHBZ#871685",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4557",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-4557"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557"
        }
      ],
      "release_date": "2012-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded"
    }
  ]
}
  RHSA-2010:0162
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw by implementing the\nTLS Renegotiation Indication Extension, as defined in RFC 5746.\n(CVE-2009-3555)\n\nRefer to the following Knowledgebase article for additional details about\nthe CVE-2009-3555 flaw: http://kbase.redhat.com/faq/docs/DOC-20491\n\nA missing return value check flaw was discovered in OpenSSL, that could\npossibly cause OpenSSL to call a Kerberos library function with invalid\narguments, resulting in a NULL pointer dereference crash in the MIT\nKerberos library. In certain configurations, a remote attacker could use\nthis flaw to crash a TLS/SSL server using OpenSSL by requesting Kerberos\ncipher suites during the TLS handshake. (CVE-2010-0433)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0162",
        "url": "https://access.redhat.com/errata/RHSA-2010:0162"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
        "url": "http://kbase.redhat.com/faq/docs/DOC-20491"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "567711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=567711"
      },
      {
        "category": "external",
        "summary": "569774",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0162.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:29:02+00:00",
      "generator": {
        "date": "2025-10-09T13:29:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0162",
      "initial_release_date": "2010-03-25T08:52:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T08:52:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T04:52:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:29:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
                  "product_id": "5Client-Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.8e-12.el5_4.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
          "product_id": "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client-Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.src"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    },
    {
      "cve": "CVE-2010-0433",
      "discovery_date": "2010-02-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "569774"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: crash caused by a missing krb5_sname_to_principal() return value check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
          "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
          "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "RHBZ#569774",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=569774"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0433",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0433"
        }
      ],
      "release_date": "2010-01-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T08:52:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0162"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client-Workstation:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client-Workstation:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Client:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Client:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.src",
            "5Server:openssl-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.i686",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-debuginfo-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.ppc64",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-devel-0:0.9.8e-12.el5_4.6.x86_64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.i386",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ia64",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.ppc",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.s390x",
            "5Server:openssl-perl-0:0.9.8e-12.el5_4.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: crash caused by a missing krb5_sname_to_principal() return value check"
    }
  ]
}
  RHSA-2010:0977
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl packages that fix three security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nA ciphersuite downgrade flaw was found in the OpenSSL SSL/TLS server code.\nA remote attacker could possibly use this flaw to change the ciphersuite\nassociated with a cached session stored on the server, if the server\nenabled the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option, possibly\nforcing the client to use a weaker ciphersuite after resuming the session.\n(CVE-2010-4180, CVE-2008-7270)\n\nNote: With this update, setting the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG\noption has no effect and this bug workaround can no longer be enabled.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could possibly crash an application using the\nOpenSSL library and its UBSEC hardware engine support. (CVE-2009-3245)\n\nAll OpenSSL users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. For the update to take effect,\nall services linked to the OpenSSL library must be restarted, or the system\nrebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0977",
        "url": "https://access.redhat.com/errata/RHSA-2010:0977"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "external",
        "summary": "659462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
      },
      {
        "category": "external",
        "summary": "660650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0977.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl security update",
    "tracking": {
      "current_release_date": "2025-10-09T13:19:02+00:00",
      "generator": {
        "date": "2025-10-09T13:19:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0977",
      "initial_release_date": "2010-12-13T18:13:00+00:00",
      "revision_history": [
        {
          "date": "2010-12-13T18:13:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-12-13T13:14:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:19:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-devel@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-debuginfo@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                "product": {
                  "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_id": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl-perl@0.9.7a-43.17.el4_8.6?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        },
        "product_reference": "openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-7270",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "660650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "RHBZ#660650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-7270",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack"
    },
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2010-4180",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "659462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
          "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
          "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "RHBZ#659462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4180",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-12-13T18:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0977"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4AS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4AS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4Desktop:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4Desktop:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4ES:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4ES:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.src",
            "4WS:openssl-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.i686",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-debuginfo-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.ppc64",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-devel-0:0.9.7a-43.17.el4_8.6.x86_64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.i386",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ia64",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.ppc",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.s390x",
            "4WS:openssl-perl-0:0.9.7a-43.17.el4_8.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack"
    }
  ]
}
  rhsa-2011:0896
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat\nCustomer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and\nMicrosoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "JBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications.\n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and\nMicrosoft Windows, this release serves as a replacement for JBoss\nEnterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to\nthe Release Notes, linked in the References, for more information.\n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host\u0027s work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages.\n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\nA flaw was discovered in the way the mod_proxy_http module of the Apache\nHTTP Server handled the timeouts of requests forwarded by a reverse proxy\nto the back-end server. In some configurations, the proxy could return\na response intended for another user under certain timeout conditions,\npossibly leading to information disclosure. Note: This issue only affected\nhttpd running on the Windows operating system. (CVE-2010-2068)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the \u0027*\u0027 wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. (CVE-2010-1623)\n\nThe following flaws were corrected in the packages for Solaris and Windows.\nUpdates for Red Hat Enterprise Linux can be downloaded from the Red Hat\nNetwork.\n\nMultiple flaws in OpenSSL, which could possibly cause a crash, code\nexecution, or a change of session parameters, have been corrected.\n(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)\n\nTwo denial of service flaws were corrected in Expat. (CVE-2009-3560,\nCVE-2009-3720)\n\nAn X.509 certificate verification flaw was corrected in OpenLDAP.\n(CVE-2009-3767)\n\nMore information about these flaws is available from the CVE links in the\nReferences.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:0896",
        "url": "https://access.redhat.com/errata/RHSA-2011:0896"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html",
        "url": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=1.0.2",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=1.0.2"
      },
      {
        "category": "external",
        "summary": "530715",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530715"
      },
      {
        "category": "external",
        "summary": "531697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
      },
      {
        "category": "external",
        "summary": "533174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "external",
        "summary": "585331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331"
      },
      {
        "category": "external",
        "summary": "618189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189"
      },
      {
        "category": "external",
        "summary": "632994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632994"
      },
      {
        "category": "external",
        "summary": "640281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281"
      },
      {
        "category": "external",
        "summary": "656246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246"
      },
      {
        "category": "external",
        "summary": "659462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
      },
      {
        "category": "external",
        "summary": "660650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
      },
      {
        "category": "external",
        "summary": "675786",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786"
      },
      {
        "category": "external",
        "summary": "675792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792"
      },
      {
        "category": "external",
        "summary": "703390",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0896.json"
      }
    ],
    "title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update",
    "tracking": {
      "current_release_date": "2025-10-09T13:19:04+00:00",
      "generator": {
        "date": "2025-10-09T13:19:04+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2011:0896",
      "initial_release_date": "2011-06-22T23:14:00+00:00",
      "revision_history": [
        {
          "date": "2011-06-22T23:14:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-06-22T19:16:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:19:04+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0",
                  "product_id": "Red Hat JBoss Web Server 1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-7270",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "660650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "RHBZ#660650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-7270",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack"
    },
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3560",
      "discovery_date": "2009-11-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533174"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "RHBZ#533174",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3560",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560"
        }
      ],
      "release_date": "2009-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3720",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "531697"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "RHBZ#531697",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720"
        }
      ],
      "release_date": "2009-01-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3767",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530715"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenLDAP: Doesn\u0027t properly handle NULL character in subject Common Name",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was addressed in the openldap packages as shipped with Red Hat Enterprise Linux 5 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0198.html and https://rhn.redhat.com/errata/RHSA-2010-0543.html respectively.\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future openldap update may address this flaw in Red Hat Enterprise Linux 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3767"
        },
        {
          "category": "external",
          "summary": "RHBZ#530715",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530715"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3767"
        }
      ],
      "release_date": "2009-08-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenLDAP: Doesn\u0027t properly handle NULL character in subject Common Name"
    },
    {
      "cve": "CVE-2010-1157",
      "discovery_date": "2010-04-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "585331"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server\u0027s hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information disclosure in authentication headers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1157"
        },
        {
          "category": "external",
          "summary": "RHBZ#585331",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1157",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157"
        }
      ],
      "release_date": "2010-04-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: information disclosure in authentication headers"
    },
    {
      "cve": "CVE-2010-1452",
      "discovery_date": "2010-07-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "618189"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1452"
        },
        {
          "category": "external",
          "summary": "RHBZ#618189",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1452",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1452",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1452"
        }
      ],
      "release_date": "2010-07-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments"
    },
    {
      "cve": "CVE-2010-1623",
      "discovery_date": "2010-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "640281"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr-util: high memory consumption in apr_brigade_split_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1623"
        },
        {
          "category": "external",
          "summary": "RHBZ#640281",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1623",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1623"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1623",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1623"
        }
      ],
      "release_date": "2010-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr-util: high memory consumption in apr_brigade_split_line()"
    },
    {
      "cve": "CVE-2010-2068",
      "discovery_date": "2010-09-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "632994"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "(mod_proxy): Sensitive response disclosure due improper handling of timeouts",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2068"
        },
        {
          "category": "external",
          "summary": "RHBZ#632994",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632994"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2068"
        }
      ],
      "release_date": "2010-06-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "(mod_proxy): Sensitive response disclosure due improper handling of timeouts"
    },
    {
      "cve": "CVE-2010-3718",
      "discovery_date": "2011-02-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "675792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: file permission bypass flaw",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-3718"
        },
        {
          "category": "external",
          "summary": "RHBZ#675792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3718",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3718",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3718"
        }
      ],
      "release_date": "2011-02-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: file permission bypass flaw"
    },
    {
      "cve": "CVE-2010-4172",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2010-11-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "656246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: cross-site-scripting vulnerability in the manager application",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4172"
        },
        {
          "category": "external",
          "summary": "RHBZ#656246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4172",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4172",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4172"
        }
      ],
      "release_date": "2010-11-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: cross-site-scripting vulnerability in the manager application"
    },
    {
      "cve": "CVE-2010-4180",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "659462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "RHBZ#659462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4180",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack"
    },
    {
      "cve": "CVE-2011-0013",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2011-02-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "675786"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: XSS vulnerability in HTML Manager interface",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0013"
        },
        {
          "category": "external",
          "summary": "RHBZ#675786",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0013",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0013",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0013"
        }
      ],
      "release_date": "2011-01-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: XSS vulnerability in HTML Manager interface"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maksymilian Arciemowicz"
          ]
        }
      ],
      "cve": "CVE-2011-0419",
      "discovery_date": "2011-05-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "703390"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr: unconstrained recursion in apr_fnmatch",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0419"
        },
        {
          "category": "external",
          "summary": "RHBZ#703390",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0419",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0419",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0419"
        }
      ],
      "release_date": "2011-05-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        },
        {
          "category": "workaround",
          "details": "mod_autoindex can be configured to ignore request query arguments provided by the client by adding IgnoreClient option to the IndexOptions directive:\n\nhttp://httpd.apache.org/docs/2.2/mod/mod_autoindex.html#indexoptions.ignoreclient",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr: unconstrained recursion in apr_fnmatch"
    },
    {
      "cve": "CVE-2012-4557",
      "discovery_date": "2012-10-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "871685"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of httpd as shipped with Red Hat Enterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-4557"
        },
        {
          "category": "external",
          "summary": "RHBZ#871685",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4557",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-4557"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557"
        }
      ],
      "release_date": "2012-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded"
    }
  ]
}
  rhsa-2010_0440
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated rhev-hypervisor package that fixes two security issues and\nseveral bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The rhev-hypervisor package provides a Red Hat Enterprise Virtualization\n(RHEV) Hypervisor ISO disk image. The RHEV Hypervisor is a dedicated\nKernel-based Virtual Machine (KVM) hypervisor. It includes everything\nnecessary to run and manage virtual machines: A subset of the Red Hat\nEnterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: RHEV Hypervisor is only available for the Intel 64 and AMD64\narchitectures with virtualization extensions.\n\nIt was discovered that OpenSSL did not always check the return value of\nthe bn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handled session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update addresses this flaw in openssl, nss, and\ngnutls by implementing the TLS Renegotiation Indication Extension, as\ndefined in RFC 5746. (CVE-2009-3555)\n\nThis updated package provides updated components that include fixes for\nsecurity issues; however, these issues have no security impact for RHEV\nHypervisor. These fixes are for kernel issues CVE-2009-4307, CVE-2010-0727,\nCVE-2009-4027, and CVE-2010-1188; cpio issues CVE-2010-0624 and\nCVE-2007-4476; gnutls issue CVE-2009-2409; openssl issue CVE-2010-0433; and\ntar issues CVE-2010-0624 and CVE-2007-4476.\n\nThis update also fixes the following bugs:\n\n* bridged network interfaces using the bnx2x, mlx4_en, enic and s2io\ndrivers had Large Receive Offload (LRO) enabled by default. This caused\nsignificantly degraded network I/O performance. LRO has been disabled for\nall network interface drivers which have LRO enabled by default in Red Hat\nEnterprise Linux 5. With this change, network I/O performance is\nsignificantly improved. (BZ#576374, BZ#579730)\n\n* RHEV Hypervisor supported IPv6, but as this is not used to communicate\nwith the RHEV Manager, it is superfluous. Support for IPv6 has now been\ndisabled in RHEV Hypervisor. (BZ#577300)\n\n* for VLAN interfaces, the hardware (MAC) address of the interface was set\nonly in the VLAN ifcfg script, not in the physical interface ifcfg script.\nThis caused network interfaces with VLAN tags to intermittently fail on\nboot. The MAC address is now set in the ifcfg script for the underlying\nphysical interface. Network interfaces with VLAN tags now work consistently\nbetween reboots. (BZ#581876)\n\n* the hypervisor would hang on reboot after repeated upgrade operations,\ndue to GRUB accessing the /boot file system before it was flushed. The\n/boot file system is now remounted before GRUB accesses it. (BZ#591111)\n\nAs RHEV Hypervisor is based on KVM, the bug fixes from the KVM update\nRHBA-2010:0434 have been included in this update. Also included are the bug\nfixes from the RHEV Manager Agent (VDSM) update RHBA-2010:0435.\n\nKVM: https://rhn.redhat.com/errata/RHBA-2010-0434.html\nVDSM: https://rhn.redhat.com/errata/RHBA-2010-0435.html\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which corrects these issues.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0440",
        "url": "https://access.redhat.com/errata/RHSA-2010:0440"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "533125",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0440.json"
      }
    ],
    "title": "Red Hat Security Advisory: rhev-hypervisor security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-14T10:49:12+00:00",
      "generator": {
        "date": "2024-11-14T10:49:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2010:0440",
      "initial_release_date": "2010-05-25T20:41:00+00:00",
      "revision_history": [
        {
          "date": "2010-05-25T20:41:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-05-25T16:41:48+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T10:49:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Virtualization Hypervisor 5",
                "product": {
                  "name": "Red Hat Enterprise Virtualization Hypervisor 5",
                  "product_id": "5Server-RHEV-Hypervisor-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Virtualization"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                "product": {
                  "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                  "product_id": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.12.1.el5_4rhev2_1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                "product": {
                  "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_id": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.12.1.el5_4rhev2_1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                "product": {
                  "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_id": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rhev-hypervisor-pxe@5.4-2.1.12.1.el5_4rhev2_1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        },
        "product_reference": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src"
        },
        "product_reference": "rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch as a component of Red Hat Enterprise Virtualization Hypervisor 5",
          "product_id": "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        },
        "product_reference": "rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
        "relates_to_product_reference": "5Server-RHEV-Hypervisor-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-05-25T20:41:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0440"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3555",
      "cwe": {
        "id": "CWE-300",
        "name": "Channel Accessible by Non-Endpoint"
      },
      "discovery_date": "2009-10-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533125"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "TLS: MITM attacks via session renegotiation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
          "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "RHBZ#533125",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
        }
      ],
      "release_date": "2009-11-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-05-25T20:41:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0440"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.noarch",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-0:5.4-2.1.12.1.el5_4rhev2_1.src",
            "5Server-RHEV-Hypervisor-2:rhev-hypervisor-pxe-0:5.4-2.1.12.1.el5_4rhev2_1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "TLS: MITM attacks via session renegotiation"
    }
  ]
}
  rhsa-2010:0173
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated openssl096b packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 3 and 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols, as well as a\nfull-strength, general purpose cryptography library.\n\nIt was discovered that OpenSSL did not always check the return value of the\nbn_wexpand() function. An attacker able to trigger a memory allocation\nfailure in that function could cause an application using the OpenSSL\nlibrary to crash or, possibly, execute arbitrary code. (CVE-2009-3245)\n\nAll openssl096b users should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. For the update to take\neffect, all programs using the openssl096b library must be restarted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0173",
        "url": "https://access.redhat.com/errata/RHSA-2010:0173"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-26039",
        "url": "http://kbase.redhat.com/faq/docs/DOC-26039"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0173.json"
      }
    ],
    "title": "Red Hat Security Advisory: openssl096b security update",
    "tracking": {
      "current_release_date": "2025-09-26T03:04:22+00:00",
      "generator": {
        "date": "2025-09-26T03:04:22+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2010:0173",
      "initial_release_date": "2010-03-25T09:51:00+00:00",
      "revision_history": [
        {
          "date": "2010-03-25T09:51:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-03-25T05:58:33+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-26T03:04:22+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 3",
                  "product_id": "3AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Desktop version 3",
                "product": {
                  "name": "Red Hat Desktop version 3",
                  "product_id": "3Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 3",
                  "product_id": "3ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 3",
                  "product_id": "3WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.ia64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.ia64",
                  "product_id": "openssl096b-0:0.9.6b-16.50.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.i386",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.i386",
                  "product_id": "openssl096b-0:0.9.6b-16.50.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.x86_64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.x86_64",
                  "product_id": "openssl096b-0:0.9.6b-16.50.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.src",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.src",
                  "product_id": "openssl096b-0:0.9.6b-16.50.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.ppc",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.ppc",
                  "product_id": "openssl096b-0:0.9.6b-16.50.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-16.50?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-16.50.s390",
                "product": {
                  "name": "openssl096b-0:0.9.6b-16.50.s390",
                  "product_id": "openssl096b-0:0.9.6b-16.50.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-16.50?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                "product": {
                  "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_id": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22.46.el4_8.1?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                "product": {
                  "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_id": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/openssl096b-debuginfo@0.9.6b-22.46.el4_8.1?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.src as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.src",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        },
        "product_reference": "openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:openssl096b-0:0.9.6b-16.50.i386",
          "3AS:openssl096b-0:0.9.6b-16.50.ia64",
          "3AS:openssl096b-0:0.9.6b-16.50.ppc",
          "3AS:openssl096b-0:0.9.6b-16.50.s390",
          "3AS:openssl096b-0:0.9.6b-16.50.src",
          "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
          "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
          "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
          "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
          "3Desktop:openssl096b-0:0.9.6b-16.50.src",
          "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3ES:openssl096b-0:0.9.6b-16.50.i386",
          "3ES:openssl096b-0:0.9.6b-16.50.ia64",
          "3ES:openssl096b-0:0.9.6b-16.50.ppc",
          "3ES:openssl096b-0:0.9.6b-16.50.s390",
          "3ES:openssl096b-0:0.9.6b-16.50.src",
          "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "3WS:openssl096b-0:0.9.6b-16.50.i386",
          "3WS:openssl096b-0:0.9.6b-16.50.ia64",
          "3WS:openssl096b-0:0.9.6b-16.50.ppc",
          "3WS:openssl096b-0:0.9.6b-16.50.s390",
          "3WS:openssl096b-0:0.9.6b-16.50.src",
          "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
          "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
          "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
          "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-03-25T09:51:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:openssl096b-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-0:0.9.6b-16.50.src",
            "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-0:0.9.6b-16.50.src",
            "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-0:0.9.6b-16.50.src",
            "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-0:0.9.6b-16.50.src",
            "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0173"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:openssl096b-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-0:0.9.6b-16.50.src",
            "3AS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3AS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-0:0.9.6b-16.50.src",
            "3Desktop:openssl096b-0:0.9.6b-16.50.x86_64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3Desktop:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-0:0.9.6b-16.50.src",
            "3ES:openssl096b-0:0.9.6b-16.50.x86_64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3ES:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-0:0.9.6b-16.50.src",
            "3WS:openssl096b-0:0.9.6b-16.50.x86_64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.i386",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ia64",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.ppc",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.s390",
            "3WS:openssl096b-debuginfo-0:0.9.6b-16.50.x86_64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4AS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4AS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4Desktop:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4Desktop:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4ES:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4ES:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.src",
            "4WS:openssl096b-0:0.9.6b-22.46.el4_8.1.x86_64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.i386",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ia64",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.ppc",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.s390",
            "4WS:openssl096b-debuginfo-0:0.9.6b-22.46.el4_8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    }
  ]
}
  RHSA-2011:0896
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat\nCustomer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and\nMicrosoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "JBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications.\n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and\nMicrosoft Windows, this release serves as a replacement for JBoss\nEnterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to\nthe Release Notes, linked in the References, for more information.\n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host\u0027s work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages.\n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\nA flaw was discovered in the way the mod_proxy_http module of the Apache\nHTTP Server handled the timeouts of requests forwarded by a reverse proxy\nto the back-end server. In some configurations, the proxy could return\na response intended for another user under certain timeout conditions,\npossibly leading to information disclosure. Note: This issue only affected\nhttpd running on the Windows operating system. (CVE-2010-2068)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the \u0027*\u0027 wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. (CVE-2010-1623)\n\nThe following flaws were corrected in the packages for Solaris and Windows.\nUpdates for Red Hat Enterprise Linux can be downloaded from the Red Hat\nNetwork.\n\nMultiple flaws in OpenSSL, which could possibly cause a crash, code\nexecution, or a change of session parameters, have been corrected.\n(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)\n\nTwo denial of service flaws were corrected in Expat. (CVE-2009-3560,\nCVE-2009-3720)\n\nAn X.509 certificate verification flaw was corrected in OpenLDAP.\n(CVE-2009-3767)\n\nMore information about these flaws is available from the CVE links in the\nReferences.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:0896",
        "url": "https://access.redhat.com/errata/RHSA-2011:0896"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html",
        "url": "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=1.0.2",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=webserver\u0026version=1.0.2"
      },
      {
        "category": "external",
        "summary": "530715",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530715"
      },
      {
        "category": "external",
        "summary": "531697",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
      },
      {
        "category": "external",
        "summary": "533174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
      },
      {
        "category": "external",
        "summary": "570924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
      },
      {
        "category": "external",
        "summary": "585331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331"
      },
      {
        "category": "external",
        "summary": "618189",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189"
      },
      {
        "category": "external",
        "summary": "632994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632994"
      },
      {
        "category": "external",
        "summary": "640281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281"
      },
      {
        "category": "external",
        "summary": "656246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246"
      },
      {
        "category": "external",
        "summary": "659462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
      },
      {
        "category": "external",
        "summary": "660650",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
      },
      {
        "category": "external",
        "summary": "675786",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786"
      },
      {
        "category": "external",
        "summary": "675792",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792"
      },
      {
        "category": "external",
        "summary": "703390",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0896.json"
      }
    ],
    "title": "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update",
    "tracking": {
      "current_release_date": "2025-10-09T13:19:04+00:00",
      "generator": {
        "date": "2025-10-09T13:19:04+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2011:0896",
      "initial_release_date": "2011-06-22T23:14:00+00:00",
      "revision_history": [
        {
          "date": "2011-06-22T23:14:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-06-22T19:16:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:19:04+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 1.0",
                "product": {
                  "name": "Red Hat JBoss Web Server 1.0",
                  "product_id": "Red Hat JBoss Web Server 1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-7270",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "660650"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "RHBZ#660650",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=660650"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-7270",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-7270"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-7270"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack"
    },
    {
      "cve": "CVE-2009-3245",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2010-03-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "570924"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: missing bn_wexpand return value checks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "RHBZ#570924",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570924"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3245",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
        }
      ],
      "release_date": "2010-02-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.6,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "openssl: missing bn_wexpand return value checks"
    },
    {
      "cve": "CVE-2009-3560",
      "discovery_date": "2009-11-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533174"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "RHBZ#533174",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3560",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560"
        }
      ],
      "release_date": "2009-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3720",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "531697"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "RHBZ#531697",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720"
        }
      ],
      "release_date": "2009-01-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3767",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530715"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "OpenLDAP: Doesn\u0027t properly handle NULL character in subject Common Name",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue was addressed in the openldap packages as shipped with Red Hat Enterprise Linux 5 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0198.html and https://rhn.redhat.com/errata/RHSA-2010-0543.html respectively.\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future openldap update may address this flaw in Red Hat Enterprise Linux 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3767"
        },
        {
          "category": "external",
          "summary": "RHBZ#530715",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530715"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3767",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3767"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3767",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3767"
        }
      ],
      "release_date": "2009-08-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "OpenLDAP: Doesn\u0027t properly handle NULL character in subject Common Name"
    },
    {
      "cve": "CVE-2010-1157",
      "discovery_date": "2010-04-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "585331"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server\u0027s hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: information disclosure in authentication headers",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1157"
        },
        {
          "category": "external",
          "summary": "RHBZ#585331",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=585331"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1157",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1157"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1157"
        }
      ],
      "release_date": "2010-04-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "tomcat: information disclosure in authentication headers"
    },
    {
      "cve": "CVE-2010-1452",
      "discovery_date": "2010-07-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "618189"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1452"
        },
        {
          "category": "external",
          "summary": "RHBZ#618189",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=618189"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1452",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1452",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1452"
        }
      ],
      "release_date": "2010-07-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments"
    },
    {
      "cve": "CVE-2010-1623",
      "discovery_date": "2010-10-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "640281"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr-util: high memory consumption in apr_brigade_split_line()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-1623"
        },
        {
          "category": "external",
          "summary": "RHBZ#640281",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640281"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1623",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-1623"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1623",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1623"
        }
      ],
      "release_date": "2010-10-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr-util: high memory consumption in apr_brigade_split_line()"
    },
    {
      "cve": "CVE-2010-2068",
      "discovery_date": "2010-09-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "632994"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "(mod_proxy): Sensitive response disclosure due improper handling of timeouts",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-2068"
        },
        {
          "category": "external",
          "summary": "RHBZ#632994",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632994"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2068",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2068",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2068"
        }
      ],
      "release_date": "2010-06-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "(mod_proxy): Sensitive response disclosure due improper handling of timeouts"
    },
    {
      "cve": "CVE-2010-3718",
      "discovery_date": "2011-02-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "675792"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: file permission bypass flaw",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-3718"
        },
        {
          "category": "external",
          "summary": "RHBZ#675792",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675792"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3718",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-3718"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3718",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3718"
        }
      ],
      "release_date": "2011-02-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: file permission bypass flaw"
    },
    {
      "cve": "CVE-2010-4172",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2010-11-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "656246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: cross-site-scripting vulnerability in the manager application",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4172"
        },
        {
          "category": "external",
          "summary": "RHBZ#656246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4172",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4172"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4172",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4172"
        }
      ],
      "release_date": "2010-11-22T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: cross-site-scripting vulnerability in the manager application"
    },
    {
      "cve": "CVE-2010-4180",
      "discovery_date": "2010-12-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "659462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "RHBZ#659462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4180",
          "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4180"
        }
      ],
      "release_date": "2010-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack"
    },
    {
      "cve": "CVE-2011-0013",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2011-02-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "675786"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: XSS vulnerability in HTML Manager interface",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0013"
        },
        {
          "category": "external",
          "summary": "RHBZ#675786",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675786"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0013",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0013"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0013",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0013"
        }
      ],
      "release_date": "2011-01-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "tomcat: XSS vulnerability in HTML Manager interface"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Maksymilian Arciemowicz"
          ]
        }
      ],
      "cve": "CVE-2011-0419",
      "discovery_date": "2011-05-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "703390"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "apr: unconstrained recursion in apr_fnmatch",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0419"
        },
        {
          "category": "external",
          "summary": "RHBZ#703390",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703390"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0419",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0419",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0419"
        }
      ],
      "release_date": "2011-05-10T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        },
        {
          "category": "workaround",
          "details": "mod_autoindex can be configured to ignore request query arguments provided by the client by adding IgnoreClient option to the IndexOptions directive:\n\nhttp://httpd.apache.org/docs/2.2/mod/mod_autoindex.html#indexoptions.ignoreclient",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "apr: unconstrained recursion in apr_fnmatch"
    },
    {
      "cve": "CVE-2012-4557",
      "discovery_date": "2012-10-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "871685"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the version of httpd as shipped with Red Hat Enterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 1.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-4557"
        },
        {
          "category": "external",
          "summary": "RHBZ#871685",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871685"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4557",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-4557"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4557"
        }
      ],
      "release_date": "2012-01-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-06-22T23:14:00+00:00",
          "details": "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Web Server 1.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0896"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Web Server 1.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded"
    }
  ]
}
  CERTA-2010-AVI-627
Vulnerability from certfr_avis
De nombreuses vulnérabilités, liées à l'utilisation de versions anciennes du code OpenSSL, affectent Blue Coat Reporter. Les plus dommageables permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
De nombreuses vulnérabilités, liées à l'utilisation de versions anciennes du code OpenSSL, affectent Blue Coat Reporter. Les plus dommageables permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Solution
Pour la version 9, la révision 9.2.4.1 remédie à ces vulnérabilités. Le correctif de la version 8 n'est pas encore disponible.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Blue Coat Reporter, versions 8.x et 9.x.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eBlue Coat Reporter, versions 8.x et  9.x.\u003c/p\u003e",
  "content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s, li\u00e9es \u00e0 l\u0027utilisation de versions\nanciennes du code OpenSSL, affectent Blue Coat Reporter. Les plus\ndommageables permettent \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n\n## Solution\n\nPour la version 9, la r\u00e9vision 9.2.4.1 rem\u00e9die \u00e0 ces vuln\u00e9rabilit\u00e9s. Le\ncorrectif de la version 8 n\u0027est pas encore disponible.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2008-1678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1678"
    },
    {
      "name": "CVE-2010-0433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
    },
    {
      "name": "CVE-2010-0742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0742"
    },
    {
      "name": "CVE-2009-0789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0789"
    },
    {
      "name": "CVE-2009-1379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1379"
    },
    {
      "name": "CVE-2009-3555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
    },
    {
      "name": "CVE-2009-0591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0591"
    },
    {
      "name": "CVE-2009-1378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1378"
    },
    {
      "name": "CVE-2009-1377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1377"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2010-0740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0740"
    },
    {
      "name": "CVE-2009-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0590"
    },
    {
      "name": "CVE-2009-4355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4355"
    }
  ],
  "initial_release_date": "2010-12-23T00:00:00",
  "last_revision_date": "2010-12-23T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-627",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-12-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De nombreuses vuln\u00e9rabilit\u00e9s, li\u00e9es \u00e0 l\u0027utilisation de versions\nanciennes du code OpenSSL, affectent Blue Coat Reporter. Les plus\ndommageables permettent \u00e0 un utilisateur malveillant d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans Blue Coat Reporter",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA50 du 19 novembre 2010",
      "url": "http://kb.bluecoat.com/index?page=content\u0026id=SA50"
    }
  ]
}
  CERTA-2011-AVI-369
Vulnerability from certfr_avis
De nombreuses vulnérabilités ont été corrigées dans Mac OS X. Leur exploitation permet, entre autres, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été corrigées dans différents composants du système d'exploitation Mac OS X, notamment :
- AirPort ;
 - App Store ;
 - Gestion des certificats ;
 - ColorSync ;
 - CoreFoundation ;
 - CoreGraphics ;
 - FTP Server ;
 - ImageIO ;
 - Kernel ;
 - Libsystem ;
 - Libxslt ;
 - MobileMe ;
 - MySQL ;
 - OpenSSL ;
 - QuickTime ;
 - Samba ;
 - Servermgrd ;
 - Subversion.
 
Certaines vulnérabilités permettent l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Mac OS X 10.5.8 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Mac OS X Server 10.6.x.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Mac OS X Server 10.5.8 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Mac OS X 10.6.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents composants\ndu syst\u00e8me d\u0027exploitation Mac OS X, notamment\u00a0:\n\n-   AirPort\u00a0;\n-   App Store\u00a0;\n-   Gestion des certificats\u00a0;\n-   ColorSync\u00a0;\n-   CoreFoundation\u00a0;\n-   CoreGraphics\u00a0;\n-   FTP Server\u00a0;\n-   ImageIO\u00a0;\n-   Kernel\u00a0;\n-   Libsystem\u00a0;\n-   Libxslt\u00a0;\n-   MobileMe\u00a0;\n-   MySQL\u00a0;\n-   OpenSSL\u00a0;\n-   QuickTime\u00a0;\n-   Samba\u00a0;\n-   Servermgrd\u00a0;\n-   Subversion.\n\nCertaines vuln\u00e9rabilit\u00e9s permettent l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2011-0195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0195"
    },
    {
      "name": "CVE-2011-0200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0200"
    },
    {
      "name": "CVE-2011-0208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0208"
    },
    {
      "name": "CVE-2010-4651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4651"
    },
    {
      "name": "CVE-2010-3835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3835"
    },
    {
      "name": "CVE-2011-0198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0198"
    },
    {
      "name": "CVE-2011-0715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0715"
    },
    {
      "name": "CVE-2010-3837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3837"
    },
    {
      "name": "CVE-2010-3682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3682"
    },
    {
      "name": "CVE-2011-0207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0207"
    },
    {
      "name": "CVE-2011-0202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0202"
    },
    {
      "name": "CVE-2011-0196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0196"
    },
    {
      "name": "CVE-2010-3677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3677"
    },
    {
      "name": "CVE-2011-0197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0197"
    },
    {
      "name": "CVE-2011-0210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0210"
    },
    {
      "name": "CVE-2011-0209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0209"
    },
    {
      "name": "CVE-2011-0203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0203"
    },
    {
      "name": "CVE-2011-0206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0206"
    },
    {
      "name": "CVE-2011-0719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0719"
    },
    {
      "name": "CVE-2010-3790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3790"
    },
    {
      "name": "CVE-2010-4180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4180"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2010-0740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0740"
    },
    {
      "name": "CVE-2010-2632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2632"
    },
    {
      "name": "CVE-2011-1132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-1132"
    },
    {
      "name": "CVE-2011-0213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0213"
    },
    {
      "name": "CVE-2010-3838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3838"
    },
    {
      "name": "CVE-2011-0212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0212"
    },
    {
      "name": "CVE-2011-0205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0205"
    },
    {
      "name": "CVE-2010-3836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3836"
    },
    {
      "name": "CVE-2011-0204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0204"
    },
    {
      "name": "CVE-2011-0199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0199"
    },
    {
      "name": "CVE-2010-3069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3069"
    },
    {
      "name": "CVE-2011-0201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0201"
    },
    {
      "name": "CVE-2010-3864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3864"
    },
    {
      "name": "CVE-2010-3833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3833"
    },
    {
      "name": "CVE-2011-0014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0014"
    },
    {
      "name": "CVE-2011-0211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0211"
    },
    {
      "name": "CVE-2010-3834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3834"
    }
  ],
  "initial_release_date": "2011-06-24T00:00:00",
  "last_revision_date": "2011-06-24T00:00:00",
  "links": [],
  "reference": "CERTA-2011-AVI-369",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2011-06-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Leur\nexploitation permet, entre autres, l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT4723 du 23 juin 2011",
      "url": "http://docs.info.apple.com/article.html?artnum=HT4723"
    }
  ]
}
  CERTFR-2021-AVI-669
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Moxa. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Moxa | N/A | micrologiciel des équipements de la gamme WAC-2004 : ces équipements ne sont plus maintenus et ne bénéficieront pas de correctif | ||
| Moxa | N/A | micrologiciel des équipements de la gamme OnCell G3470A sans le dernier correctif | ||
| Moxa | N/A | micrologiciel des équipements de la gamme WDR-3124A : ces équipements ne sont plus maintenus et ne bénéficieront pas de correctif | ||
| Moxa | N/A | micrologiciel des équipements de la gamme WAC-1001 sans le dernier correctif | ||
| Moxa | N/A | micrologiciel des équipements de la gamme TAP-323 sans le dernier correctif | 
| Title | Publication Time | Tags | |
|---|---|---|---|
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "micrologiciel des \u00e9quipements de la gamme WAC-2004 : ces \u00e9quipements ne sont plus maintenus et ne b\u00e9n\u00e9ficieront pas de correctif",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Moxa",
          "scada": true
        }
      }
    },
    {
      "description": "micrologiciel des \u00e9quipements de la gamme OnCell G3470A sans le dernier correctif",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Moxa",
          "scada": true
        }
      }
    },
    {
      "description": "micrologiciel des \u00e9quipements de la gamme WDR-3124A : ces \u00e9quipements ne sont plus maintenus et ne b\u00e9n\u00e9ficieront pas de correctif",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Moxa",
          "scada": true
        }
      }
    },
    {
      "description": "micrologiciel des \u00e9quipements de la gamme WAC-1001 sans le dernier correctif",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Moxa",
          "scada": true
        }
      }
    },
    {
      "description": "micrologiciel des \u00e9quipements de la gamme TAP-323 sans le dernier correctif",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Moxa",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-0742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0742"
    },
    {
      "name": "CVE-2012-2136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2136"
    },
    {
      "name": "CVE-2012-0207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0207"
    },
    {
      "name": "CVE-2018-6485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-6485"
    },
    {
      "name": "CVE-2017-7618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7618"
    },
    {
      "name": "CVE-2010-4252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4252"
    },
    {
      "name": "CVE-2010-4805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4805"
    },
    {
      "name": "CVE-2015-0292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
    },
    {
      "name": "CVE-2017-11176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11176"
    },
    {
      "name": "CVE-2016-4997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4997"
    },
    {
      "name": "CVE-2012-2110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
    },
    {
      "name": "CVE-2006-2940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-2940"
    },
    {
      "name": "CVE-2021-39279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39279"
    },
    {
      "name": "CVE-2021-39278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39278"
    },
    {
      "name": "CVE-2012-6638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-6638"
    },
    {
      "name": "CVE-2014-2523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-2523"
    },
    {
      "name": "CVE-2016-10229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10229"
    },
    {
      "name": "CVE-2016-7039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7039"
    },
    {
      "name": "CVE-2014-3567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3567"
    },
    {
      "name": "CVE-2011-0709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0709"
    },
    {
      "name": "CVE-2010-4251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4251"
    },
    {
      "name": "CVE-2014-3512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3512"
    },
    {
      "name": "CVE-2012-3552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3552"
    },
    {
      "name": "CVE-2012-6701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-6701"
    },
    {
      "name": "CVE-2017-1000111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000111"
    },
    {
      "name": "CVE-2019-3896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
    },
    {
      "name": "CVE-2012-6704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-6704"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2016-8717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8717"
    },
    {
      "name": "CVE-2019-16746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
    },
    {
      "name": "CVE-2016-3134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3134"
    },
    {
      "name": "CVE-2008-4609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4609"
    },
    {
      "name": "CVE-2014-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-8176"
    },
    {
      "name": "CVE-2015-5364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5364"
    },
    {
      "name": "CVE-2014-9984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-9984"
    },
    {
      "name": "CVE-2009-1298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1298"
    },
    {
      "name": "CVE-2015-1465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-1465"
    },
    {
      "name": "CVE-2012-4412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-4412"
    },
    {
      "name": "CVE-2014-9402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-9402"
    },
    {
      "name": "CVE-2006-3738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-3738"
    },
    {
      "name": "CVE-2016-8666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8666"
    },
    {
      "name": "CVE-2010-3864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3864"
    },
    {
      "name": "CVE-2015-0235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0235"
    },
    {
      "name": "CVE-2016-7117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7117"
    },
    {
      "name": "CVE-2011-2525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-2525"
    },
    {
      "name": "CVE-2006-2937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-2937"
    },
    {
      "name": "CVE-2015-7547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7547"
    },
    {
      "name": "CVE-2014-5119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-5119"
    },
    {
      "name": "CVE-2017-8890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8890"
    },
    {
      "name": "CVE-2016-7406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7406"
    },
    {
      "name": "CVE-2013-7470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-7470"
    },
    {
      "name": "CVE-2016-2109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109"
    },
    {
      "name": "CVE-2012-0056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0056"
    },
    {
      "name": "CVE-2016-2108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108"
    },
    {
      "name": "CVE-2010-2692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-2692"
    },
    {
      "name": "CVE-2016-2148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2148"
    },
    {
      "name": "CVE-2010-3848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3848"
    },
    {
      "name": "CVE-2010-1162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1162"
    }
  ],
  "initial_release_date": "2021-09-01T00:00:00",
  "last_revision_date": "2021-09-01T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-669",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-09-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Moxa.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Moxa",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moxa tap-323-wac-1001-2004-wireless-ap-bridge-client-vulnerabilities du 1 septembre 2021",
      "url": "https://www.moxa.com/en/support/product-support/security-advisory/tap-323-wac-1001-2004-wireless-ap-bridge-client-vulnerabilities"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moxa oncell-g3470a-wdr-3124a-cellular-gateways-router-vulnerabilities du 1 septembre 2021",
      "url": "https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3470a-wdr-3124a-cellular-gateways-router-vulnerabilities"
    }
  ]
}
  CERTFR-2021-AVI-033
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper Networks SRC Series versions antérieures à 4.12.0R6 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à 1911.31 | ||
| Juniper Networks | Junos OS Evolved | Juniper Junos OS Evolved versions antérieures à 19.3R2-S5-EVO, 19.4R2-S2-EVO, 20.1R1-S2-EVO, 20.1R1-S4-EVO, 20.1R2-S1-EVO, 20.2R1-EVO, 20.3R1-S1-EVO, 20.3R2-EVO et 20.4R1-EVO | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R12-S17, 12.3X48-D105, 14.1X53-D53, 15.1R7-S6, 15.1R7-S7, 15.1R7-S8, 15.1X49-D230, 15.1X49-D240, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.2R3-S3, 17.2R3-S4, 17.3R2-S5, 17.3R3-S10, 17.3R3-S7, 17.3R3-S8, 17.3R3-S9, 17.4R2-S11, 17.4R2-S12, 17.4R2-S9, 17.4R3, 17.4R3-S2, 17.4R3-S3, 17.4R3-S4, 18.1R3-S10, 18.1R3-S11, 18.1R3-S12, 18.1R3-S9, 18.2R2-S7, 18.2R2-S8, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2R3-S6, 18.2R3-S7, 18.2X75-D34, 18.3R2-S4, 18.3R3-S1, 18.3R3-S2, 18.3R3-S3, 18.3R3-S4, 18.4R1-S5, 18.4R1-S8, 18.4R2-S3, 18.4R2-S5, 18.4R2-S6, 18.4R2-S7, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3, 18.4R3-S4, 18.4R3-S5, 18.4R3-S6, 19.1R1-S4, 19.1R1-S5, 19.1R1-S6, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.1R3-S3, 19.2R1-S2, 19.2R1-S5, 19.2R1-S6, 19.2R2, 19.2R2-S1, 19.2R3, 19.2R3-S1, 19.3R2, 19.3R2-S1, 19.3R2-S3, 19.3R2-S4, 19.3R2-S5, 19.3R3, 19.3R3-S1, 19.4R1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R2-S1, 19.4R2-S2, 19.4R2-S3, 19.4R3, 19.4R3-S1, 20.1R1 , 20.1R1-S2, 20.1R1-S3, 20.1R1-S4, 20.1R2, 20.2R1, 20.2R1-S1, 20.2R1-S2, 20.2R1-S3, 20.2R2, 20.3R1, 20.3R1-S1, 20.3R2 et 20.4R1 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Juniper Networks SRC Series versions ant\u00e9rieures \u00e0 4.12.0R6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 1911.31",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Junos OS Evolved versions ant\u00e9rieures \u00e0 19.3R2-S5-EVO, 19.4R2-S2-EVO, 20.1R1-S2-EVO, 20.1R1-S4-EVO, 20.1R2-S1-EVO, 20.2R1-EVO, 20.3R1-S1-EVO, 20.3R2-EVO et 20.4R1-EVO",
      "product": {
        "name": "Junos OS Evolved",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S17, 12.3X48-D105, 14.1X53-D53, 15.1R7-S6, 15.1R7-S7, 15.1R7-S8, 15.1X49-D230, 15.1X49-D240, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.2R3-S3, 17.2R3-S4, 17.3R2-S5, 17.3R3-S10, 17.3R3-S7, 17.3R3-S8, 17.3R3-S9, 17.4R2-S11, 17.4R2-S12, 17.4R2-S9, 17.4R3, 17.4R3-S2, 17.4R3-S3, 17.4R3-S4, 18.1R3-S10, 18.1R3-S11, 18.1R3-S12, 18.1R3-S9, 18.2R2-S7, 18.2R2-S8, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2R3-S6, 18.2R3-S7, 18.2X75-D34, 18.3R2-S4, 18.3R3-S1, 18.3R3-S2, 18.3R3-S3, 18.3R3-S4, 18.4R1-S5, 18.4R1-S8, 18.4R2-S3, 18.4R2-S5, 18.4R2-S6, 18.4R2-S7, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3, 18.4R3-S4, 18.4R3-S5, 18.4R3-S6, 19.1R1-S4, 19.1R1-S5, 19.1R1-S6, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.1R3-S3, 19.2R1-S2, 19.2R1-S5, 19.2R1-S6, 19.2R2, 19.2R2-S1, 19.2R3, 19.2R3-S1, 19.3R2, 19.3R2-S1, 19.3R2-S3, 19.3R2-S4, 19.3R2-S5, 19.3R3, 19.3R3-S1, 19.4R1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R2-S1, 19.4R2-S2, 19.4R2-S3, 19.4R3, 19.4R3-S1, 20.1R1 , 20.1R1-S2, 20.1R1-S3, 20.1R1-S4, 20.1R2, 20.2R1, 20.2R1-S1, 20.2R1-S2, 20.2R1-S3, 20.2R2, 20.3R1, 20.3R1-S1, 20.3R2 et 20.4R1",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0207"
    },
    {
      "name": "CVE-2021-0222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0222"
    },
    {
      "name": "CVE-2018-20997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20997"
    },
    {
      "name": "CVE-2010-0742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0742"
    },
    {
      "name": "CVE-2013-1741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1741"
    },
    {
      "name": "CVE-2021-0206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0206"
    },
    {
      "name": "CVE-2010-4252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-4252"
    },
    {
      "name": "CVE-2015-0292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
    },
    {
      "name": "CVE-2012-2110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
    },
    {
      "name": "CVE-2019-11478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
    },
    {
      "name": "CVE-2021-0202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0202"
    },
    {
      "name": "CVE-2007-5846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
    },
    {
      "name": "CVE-2013-5607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-5607"
    },
    {
      "name": "CVE-2021-0211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0211"
    },
    {
      "name": "CVE-2014-3567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-3567"
    },
    {
      "name": "CVE-2020-8617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
    },
    {
      "name": "CVE-2021-0203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0203"
    },
    {
      "name": "CVE-2021-0205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0205"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2019-11479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
    },
    {
      "name": "CVE-2021-0209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0209"
    },
    {
      "name": "CVE-2014-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-8176"
    },
    {
      "name": "CVE-2019-11477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
    },
    {
      "name": "CVE-2011-4109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-4109"
    },
    {
      "name": "CVE-2010-3864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3864"
    },
    {
      "name": "CVE-2021-0208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0208"
    },
    {
      "name": "CVE-2019-13565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
    },
    {
      "name": "CVE-2021-0212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0212"
    },
    {
      "name": "CVE-2020-8616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8616"
    },
    {
      "name": "CVE-2021-0210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0210"
    },
    {
      "name": "CVE-2014-1545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-1545"
    }
  ],
  "initial_release_date": "2021-01-14T00:00:00",
  "last_revision_date": "2021-01-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-033",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-01-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11096 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11096\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11098 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11098\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11097 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11097\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11094 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11094\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11104 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11104\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11099 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11099\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11093 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11093\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11101 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11101\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11088 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11088\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11092 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11092\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11091 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11091\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11100 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11100\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11095 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11095\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11090 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11090\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11102 du 13 janvier 2021",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11102\u0026cat=SIRT_1\u0026actp=LIST"
    }
  ]
}
  CERTA-2011-AVI-032
Vulnerability from certfr_avis
Plusieurs vulnérabilités sont présentes dans syslog-ng. Elles permettent de contourner la politique de sécurité ou de provoquer un déni de service à distance.
Description
Plusieurs vulnérabilités sont présentes dans syslog-ng.
L'une d'elles permet de contourner la politique de sécurité en raison d'un mauvais positionnement des droits d'accès sur des fichiers.
Les autres sont exploitables pour provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
syslog-ng Open Source Edition :
- versions 3.0.x antérieures à la version 3.0.10 ;
 - versions 3.1.x antérieures à la version 3.1.4 ;
 - versions 3.2.x antérieures à la version 3.2.2.
 
syslog-ng Premium Edition :
- versions 3.0.x antérieures à la version 3.0.6a ;
 - versions 3.2.x antérieures à la version 3.2.1a.
 
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003esyslog-ng Open Source Edition :  \u003cUL\u003e    \u003cLI\u003eversions 3.0.x ant\u00e9rieures \u00e0 la version 3.0.10 ;\u003c/LI\u003e    \u003cLI\u003eversions 3.1.x ant\u00e9rieures \u00e0 la version 3.1.4 ;\u003c/LI\u003e    \u003cLI\u003eversions 3.2.x ant\u00e9rieures \u00e0 la version 3.2.2.\u003c/LI\u003e  \u003c/UL\u003e  \u003cP\u003esyslog-ng Premium Edition :\u003c/P\u003e  \u003cUL\u003e    \u003cLI\u003eversions 3.0.x ant\u00e9rieures \u00e0 la version 3.0.6a ;\u003c/LI\u003e    \u003cLI\u003eversions 3.2.x ant\u00e9rieures \u00e0 la version 3.2.1a.\u003c/LI\u003e  \u003c/UL\u003e\u003c/p\u003e",
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans syslog-ng.\n\nL\u0027une d\u0027elles permet de contourner la politique de s\u00e9curit\u00e9 en raison\nd\u0027un mauvais positionnement des droits d\u0027acc\u00e8s sur des fichiers.\n\nLes autres sont exploitables pour provoquer un d\u00e9ni de service \u00e0\ndistance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-0433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
    },
    {
      "name": "CVE-2010-0742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0742"
    },
    {
      "name": "CVE-2011-0343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-0343"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2010-0740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0740"
    },
    {
      "name": "CVE-2009-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0590"
    },
    {
      "name": "CVE-2010-3864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3864"
    },
    {
      "name": "CVE-2009-2409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
    }
  ],
  "initial_release_date": "2011-01-26T00:00:00",
  "last_revision_date": "2011-01-26T00:00:00",
  "links": [
    {
      "title": "Annonces des versions de syslog-ng du 14 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000103.html"
    },
    {
      "title": "Annonces des versions de syslog-ng du 14 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000104.html"
    },
    {
      "title": "Annonces des versions de syslog-ng du 16 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000105.html"
    },
    {
      "title": "Annonces des versions de syslog-ng du 07 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
    },
    {
      "title": "Annonces des versions de syslog-ng du 07 janvier 2011 :",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
    }
  ],
  "reference": "CERTA-2011-AVI-032",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2011-01-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans syslog-ng. Elles permettent\nde contourner la politique de s\u00e9curit\u00e9 ou de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9s dans syslog-ng",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Annonces des versions de syslog-ng des 07, 14 et 16 janvier 2011",
      "url": null
    }
  ]
}
  CERTA-2009-AVI-482
Vulnerability from certfr_avis
Une vulnérabilité dans le protocole SSL/TLS permet à une personne malintentionnée de contourner la politique de sécurité.
Description
Une vulnérabilité a été identifiée dans le protocole SSL/TLS lors de renégociations de sessions. Une personne s'étant au préalable mise en situation « d'homme au milieu » (man in the middle) peut, dans certaines circonstances, injecter des données à l'encontre d'un utilisateur, pour, par exemple, forcer l'envoi d'une requête HTTP au serveur vers lequel la victime se connecte.
Solution
La version 0.9.8l de OpenSSL désactive la renégociation de sessions par défaut.
- OpenSSL versions antérieures à 0.9.8l ;
 - Sun Java Enterprise System Suite (voir le bulletin de sécurité Sun du 11 janvier 2010) ;
 - IBM WebSphere DataPower SOA appliances (voir le bulletin de sécurité IBM du 11 janvier 2010) ;
 - IBM multiples implémentations de SSL/TLS (voir le bulletin de sécurité IBM du 13 janvier 2010).
 
D'autres implémentations du protocole sont probablement touchées, ainsi que des applications utilisant OpenSSL.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cUL\u003e    \u003cLI\u003eOpenSSL versions ant\u00e9rieures \u00e0 0.9.8l ;\u003c/LI\u003e    \u003cLI\u003eSun Java Enterprise System Suite (voir le bulletin de    s\u00e9curit\u00e9 Sun du 11 janvier 2010)\u0026nbsp;;\u003c/LI\u003e    \u003cLI\u003eIBM WebSphere DataPower SOA appliances (voir le bulletin de    s\u00e9curit\u00e9 IBM du 11 janvier 2010)\u0026nbsp;;\u003c/LI\u003e    \u003cLI\u003eIBM multiples impl\u00e9mentations de SSL/TLS (voir le bulletin    de s\u00e9curit\u00e9 IBM du 13 janvier 2010).\u003c/LI\u003e  \u003c/UL\u003e  \u003cP\u003eD\u0027autres impl\u00e9mentations du protocole sont probablement  touch\u00e9es, ainsi que des applications utilisant OpenSSL.\u003c/P\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 identifi\u00e9e dans le protocole SSL/TLS lors de\nren\u00e9gociations de sessions. Une personne s\u0027\u00e9tant au pr\u00e9alable mise en\nsituation \u00ab d\u0027homme au milieu \u00bb (man in the middle) peut, dans certaines\ncirconstances, injecter des donn\u00e9es \u00e0 l\u0027encontre d\u0027un utilisateur, pour,\npar exemple, forcer l\u0027envoi d\u0027une requ\u00eate HTTP au serveur vers lequel la\nvictime se connecte.\n\n## Solution\n\nLa version 0.9.8l de OpenSSL d\u00e9sactive la ren\u00e9gociation de sessions par\nd\u00e9faut.\n",
  "cves": [
    {
      "name": "CVE-2009-3555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    }
  ],
  "initial_release_date": "2009-11-06T00:00:00",
  "last_revision_date": "2010-11-29T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM du 27 janvier 2010 pour IBM    WebSphere :",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24025719"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 RedHat RHSA-2010:0162 \u00e0 0167 du 25    mars 2010 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2010-0162.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun du 19 novembre 2009 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP c01945686 du 12 d\u00e9cembre 2009 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Documents.jsp?objectID=c01945686"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Bluecoat SA44 du 23 f\u00e9vrier 2010 :",
      "url": "http://kb.bluecoat.com/index?page=content\u0026id=SA44"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 RedHat RHSA-2010:0162 \u00e0 0167 du 25    mars 2010 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2010-0164.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20091109-tls du 26    f\u00e9vrier 2010 :",
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20091109-tls.shtml"
    },
    {
      "title": "Mise \u00e0 jour de OpenSSL :",
      "url": "http://www.openssl.org/source/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM du 25 novembre 2010 pour IBM    WebSphere MQ :",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24006386"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS10-049 du 10 ao\u00fbt 2010 :",
      "url": "http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM du 13 janvier 2010 :",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=nas258cbfcf0a5645af7862576710041f65e"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2010:0173 du 25 mars 2010    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2010-0173.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS10-049 du 10 ao\u00fbt 2010 :",
      "url": "http://www.microsoft.com/france/technet/security/Bulletin/MS10-049.mspx"
    },
    {
      "title": "Bulletin de version ProFTPd 1.3.2c :",
      "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 RedHat RHSA-2009:1579 et 1580 du 11    novembre 2009 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2009-1580.html"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 Fedora FEDORA-2009-12750, 12775 et    12782 du 07 d\u00e9cembre 2009 :",
      "url": "https://www.redhat.com/archives/fedora-packages-announce/2009-December/msg00449.html"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 RedHat RHSA-2010:0162 \u00e0 0167 du 25    mars 2010 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2010-0165.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SA:2009:057 du 18 novembre    2009 :",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200912-01 du 02 d\u00e9cembre    2009 :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200912-01.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT4004 du 19 janvier 2010 :",
      "url": "http://support.apple.com/kb/HT4004"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 Fedora FEDORA-2009-12229 et 12305 du    27 novembre 2009 :",
      "url": "https://www.redhat.com/archives/fedora-packages-announce/2009-December/msg01029.html"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 Fedora FEDORA-2009-12229 et 12305 du    27 novembre 2009 :",
      "url": "https://www.redhat.com/archives/fedora-packages-announce/2009-December/msg01020.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP c02171256 du 17 mai 2010 :",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Documents.jsp?objectID=c02171256"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 Fedora FEDORA-2009-12604 et 12606 du    04 d\u00e9cembre 2009 :",
      "url": "https://www.redhat.com/archives/fedora-packages-announce/2009-December/msg00944.html"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 Fedora FEDORA-2009-12750, 12775 et    12782 du 07 d\u00e9cembre 2009 :",
      "url": "https://www.redhat.com/archives/fedora-packages-announce/2009-December/msg00428.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20091109-tls du 22    juillet 2010 :",
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM du 22 janvier 2010 pour IBM    WebSphere :",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24025718"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 OpenBSD du 26 novembre 2009 :",
      "url": "http://openbsd.org/errata45.html#010_openssl"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 RedHat RHSA-2010:0162 \u00e0 0167 du 25    mars 2010 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2010-0166.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1934 du 16 novembre 2009 :",
      "url": "http://www.debian.org/security/2009/dsa-1934"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 RedHat RHSA-2009:1579 et 1580 du 11    novembre 2009 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2009-1579.html"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 RedHat RHSA-2010:0162 \u00e0 0167 du 25    mars 2010 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2010-0167.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM du 11 janvier 2010 :",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21390112"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 RedHat RHSA-2010:0162 \u00e0 0167 du 25    mars 2010 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2010-0163.html"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 Fedora FEDORA-2009-12750, 12775 et    12782 du 07 d\u00e9cembre 2009 :",
      "url": "https://www.redhat.com/archives/fedora-packages-announce/2009-December/msg00442.html"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 Fedora FEDORA-2009-12604 et 12606 du    04 d\u00e9cembre 2009 :",
      "url": "https://www.redhat.com/archives/fedora-packages-announce/2009-December/msg00645.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun du 11 janvier 2010 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1"
    },
    {
      "title": "Bulletins de s\u00e9curit\u00e9 OpenBSD du 26 novembre 2009 :",
      "url": "http://openbsd.org/errata46.html#004_openssl"
    }
  ],
  "reference": "CERTA-2009-AVI-482",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-11-06T00:00:00.000000"
    },
    {
      "description": "ajout du bulletin de s\u00e9curit\u00e9 Sun du 19 novembre 2009.",
      "revision_date": "2009-11-27T00:00:00.000000"
    },
    {
      "description": "ajout du bulletin de s\u00e9curit\u00e9 Sun du 11 janvier 2010.",
      "revision_date": "2010-01-11T00:00:00.000000"
    },
    {
      "description": "ajout du bulletin de s\u00e9curit\u00e9 IBM du 11 janvier 2010.",
      "revision_date": "2010-01-13T00:00:00.000000"
    },
    {
      "description": "ajout du bulletin de s\u00e9curit\u00e9 IBM du 13 janvier 2010.",
      "revision_date": "2010-01-14T00:00:00.000000"
    },
    {
      "description": "ajout des bulletins de s\u00e9curit\u00e9 IBM du 22 et 27 janvier 2010.",
      "revision_date": "2010-01-27T00:00:00.000000"
    },
    {
      "description": "ajout des bulletins de s\u00e9curit\u00e9 Apple, Bluecoat, Cisco, Debian, Fedora, Gentoo, openBSD, ProFTPd, RedHat et Suse.",
      "revision_date": "2010-03-04T00:00:00.000000"
    },
    {
      "description": "ajout des bulletins de s\u00e9curit\u00e9 RedHat et de la r\u00e9f\u00e9rence CVE-2009-3245.",
      "revision_date": "2010-03-26T00:00:00.000000"
    },
    {
      "description": "ajout des bulletins de s\u00e9curit\u00e9 HP.",
      "revision_date": "2010-05-19T00:00:00.000000"
    },
    {
      "description": "ajout du bulletin Cisco.",
      "revision_date": "2010-07-29T00:00:00.000000"
    },
    {
      "description": "ajout du bulletin Microsoft.",
      "revision_date": "2010-08-11T00:00:00.000000"
    },
    {
      "description": "ajout du bulletin IBM WebSphere MQ.",
      "revision_date": "2010-11-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans le protocole SSL/TLS permet \u00e0 une personne\nmalintentionn\u00e9e de contourner la politique de s\u00e9curit\u00e9.\n",
  "title": "Vuln\u00e9rabilit\u00e9 du protocole SSL/TLS",
  "vendor_advisories": []
}
  CERTA-2010-AVI-461
Vulnerability from certfr_avis
De nombreuses vulnérabilités affectant différents logiciels inclus dans VMware ESX Console OS ont été corrigées.
Description
Plusieurs logiciels vulnérables inclus dans VMware ESX Console OS ont été mis à jour par l'éditeur :
- le composant NSS_db est mis à jour pour corriger une vulnérabilité permettant à un utilisateur malveillant d'accéder à des données confidentielles (CVE-2010-0826) ;
 - une mise à jour du composant OpenLDAP corrige un erreur dans la gestion du Common Name d'un certificat X.509, qui permet une attaque du type « homme au milieu » (CVE-2009-3767) ;
 - la bibliothèque libcurl est mise à jour afin de corriger une vulnérabilité permettant à un attaquant d'effectuer à distance un déni de service par arrêt inopiné (CVE-2010-0734) ;
 - le logiciel sudo est mis à jour pour corriger une erreur concernant la gestion d'une variable d'environnement permettant à un utilisateur malveillant d'élever ses privilèges (CVE-2010-1646) ;
 - une mise à jour groupée des composants OpenSSL, GnuTLS, NSS et NSPR corrige différentes vulnérabilités permettant entre autres un déni de service et l'élévation de privilèges (CVE-2009-3555, CVE-2009-2409, CVE-2009-3245 et CVE-2010-0433).
 
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
VMware ESX 4.0 Console OS (COS).
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eVMware ESX 4.0 Console OS (COS).\u003c/p\u003e",
  "content": "## Description\n\nPlusieurs logiciels vuln\u00e9rables inclus dans VMware ESX Console OS ont\n\u00e9t\u00e9 mis \u00e0 jour par l\u0027\u00e9diteur :\n\n-   le composant NSS_db est mis \u00e0 jour pour corriger une vuln\u00e9rabilit\u00e9\n    permettant \u00e0 un utilisateur malveillant d\u0027acc\u00e9der \u00e0 des donn\u00e9es\n    confidentielles (CVE-2010-0826) ;\n-   une mise \u00e0 jour du composant OpenLDAP corrige un erreur dans la\n    gestion du Common Name d\u0027un certificat X.509, qui permet une attaque\n    du type \u00ab homme au milieu \u00bb (CVE-2009-3767) ;\n-   la biblioth\u00e8que libcurl est mise \u00e0 jour afin de corriger une\n    vuln\u00e9rabilit\u00e9 permettant \u00e0 un attaquant d\u0027effectuer \u00e0 distance un\n    d\u00e9ni de service par arr\u00eat inopin\u00e9 (CVE-2010-0734) ;\n-   le logiciel sudo est mis \u00e0 jour pour corriger une erreur concernant\n    la gestion d\u0027une variable d\u0027environnement permettant \u00e0 un\n    utilisateur malveillant d\u0027\u00e9lever ses privil\u00e8ges (CVE-2010-1646) ;\n-   une mise \u00e0 jour group\u00e9e des composants OpenSSL, GnuTLS, NSS et NSPR\n    corrige diff\u00e9rentes vuln\u00e9rabilit\u00e9s permettant entre autres un d\u00e9ni\n    de service et l\u0027\u00e9l\u00e9vation de privil\u00e8ges (CVE-2009-3555,\n    CVE-2009-2409, CVE-2009-3245 et CVE-2010-0433).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-0433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0433"
    },
    {
      "name": "CVE-2010-0826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0826"
    },
    {
      "name": "CVE-2010-0734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0734"
    },
    {
      "name": "CVE-2009-3767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3767"
    },
    {
      "name": "CVE-2010-1646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-1646"
    },
    {
      "name": "CVE-2009-3555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2009-2409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
    }
  ],
  "initial_release_date": "2010-10-01T00:00:00",
  "last_revision_date": "2010-10-01T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-461",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-10-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De nombreuses vuln\u00e9rabilit\u00e9s affectant diff\u00e9rents logiciels inclus dans\n\u003cspan class=\"textit\"\u003eVMware ESX Console OS\u003c/span\u003e ont \u00e9t\u00e9 corrig\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX Server",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMSA-2010-0015 du 30 septembre 2010",
      "url": "http://lists.vmware.com/pipermail/security-announce/2010/000106.html"
    }
  ]
}
  CERTA-2010-AVI-268
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans HP SSL pour OpenVMS.
Description
De multiples vulnérabilités ont été découvertes dans HP SSL pour OpenVMS. Une personne malveillante peut exploiter ces vulnérabilités pour provoquer un déni de service à distance, ou contourner la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HP SSL 1.3 pour OpenVMS Alpha versions 8.2 et sup\u00e9rieures ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP SSL 1.3 pour OpenVMS Integrity versions 8.2-1 et sup\u00e9rieures.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans HP SSL pour\nOpenVMS. Une personne malveillante peut exploiter ces vuln\u00e9rabilit\u00e9s\npour provoquer un d\u00e9ni de service \u00e0 distance, ou contourner la politique\nde s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-0789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0789"
    },
    {
      "name": "CVE-2009-0591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0591"
    },
    {
      "name": "CVE-2009-3245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
    },
    {
      "name": "CVE-2009-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0590"
    },
    {
      "name": "CVE-2008-5077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5077"
    }
  ],
  "initial_release_date": "2010-06-17T00:00:00",
  "last_revision_date": "2010-06-17T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-268",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-06-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans HP SSL pour\nOpenVMS.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans HP SSL pour OpenVMS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 HP c02227287 du 16 juin 2010",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02227287"
    }
  ]
}
  ghsa-c5qh-p8w9-vjq7
Vulnerability from github
OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
{
  "affected": [],
  "aliases": [
    "CVE-2009-3245"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2010-03-05T19:30:00Z",
    "severity": "HIGH"
  },
  "details": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
  "id": "GHSA-c5qh-p8w9-vjq7",
  "modified": "2022-05-02T03:43:04Z",
  "published": "2022-05-02T03:43:04Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3245"
    },
    {
      "type": "WEB",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
    },
    {
      "type": "WEB",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
    },
    {
      "type": "WEB",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790"
    },
    {
      "type": "WEB",
      "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
    },
    {
      "type": "WEB",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/37291"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/38761"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/39461"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/39932"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/42724"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/42733"
    },
    {
      "type": "WEB",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049"
    },
    {
      "type": "WEB",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/38562"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/USN-1003-1"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/0839"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/0916"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/0933"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2010/1216"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  gsd-2009-3245
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2009-3245",
    "description": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
    "id": "GSD-2009-3245",
    "references": [
      "https://www.suse.com/security/cve/CVE-2009-3245.html",
      "https://access.redhat.com/errata/RHSA-2011:0896",
      "https://access.redhat.com/errata/RHSA-2010:0977",
      "https://access.redhat.com/errata/RHSA-2010:0440",
      "https://access.redhat.com/errata/RHSA-2010:0173",
      "https://access.redhat.com/errata/RHSA-2010:0162",
      "https://linux.oracle.com/cve/CVE-2009-3245.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2009-3245"
      ],
      "details": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.",
      "id": "GSD-2009-3245",
      "modified": "2023-12-13T01:19:49.608690Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2009-3245",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "ADV-2010-0916",
            "refsource": "VUPEN",
            "url": "http://www.vupen.com/english/advisories/2010/0916"
          },
          {
            "name": "42724",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/42724"
          },
          {
            "name": "oval:org.mitre.oval:def:11738",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738"
          },
          {
            "name": "39461",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/39461"
          },
          {
            "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_1_0_0-stable: openssl/crypto/bn/ bn_div.c bn_gf...",
            "refsource": "MLIST",
            "url": "http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2"
          },
          {
            "name": "http://support.apple.com/kb/HT4723",
            "refsource": "CONFIRM",
            "url": "http://support.apple.com/kb/HT4723"
          },
          {
            "name": "FEDORA-2010-5357",
            "refsource": "FEDORA",
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
          },
          {
            "name": "SSA:2010-060-02",
            "refsource": "SLACKWARE",
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049"
          },
          {
            "name": "APPLE-SA-2011-06-23-1",
            "refsource": "APPLE",
            "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
          },
          {
            "name": "oval:org.mitre.oval:def:6640",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640"
          },
          {
            "name": "HPSBOV02540",
            "refsource": "HP",
            "url": "http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2"
          },
          {
            "name": "[openssl-cvs] 20100223 OpenSSL: openssl/crypto/bn/ bn_div.c bn_gf2m.c openssl/crypto/ec...",
            "refsource": "MLIST",
            "url": "http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2"
          },
          {
            "name": "38761",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/38761"
          },
          {
            "name": "SUSE-SR:2010:013",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
          },
          {
            "name": "38562",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/38562"
          },
          {
            "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
            "refsource": "MLIST",
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9790",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790"
          },
          {
            "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_0_9_8-stable: openssl/ CHANGES openssl/crypto/b...",
            "refsource": "MLIST",
            "url": "http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2"
          },
          {
            "name": "RHSA-2010:0977",
            "refsource": "REDHAT",
            "url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
          },
          {
            "name": "ADV-2010-0839",
            "refsource": "VUPEN",
            "url": "http://www.vupen.com/english/advisories/2010/0839"
          },
          {
            "name": "MDVSA-2010:076",
            "refsource": "MANDRIVA",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
          },
          {
            "name": "HPSBUX02517",
            "refsource": "HP",
            "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
          },
          {
            "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
            "refsource": "MLIST",
            "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
          },
          {
            "name": "USN-1003-1",
            "refsource": "UBUNTU",
            "url": "http://www.ubuntu.com/usn/USN-1003-1"
          },
          {
            "name": "39932",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/39932"
          },
          {
            "name": "ADV-2010-0933",
            "refsource": "VUPEN",
            "url": "http://www.vupen.com/english/advisories/2010/0933"
          },
          {
            "name": "RHSA-2011:0896",
            "refsource": "REDHAT",
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
          },
          {
            "name": "SSRT100058",
            "refsource": "HP",
            "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
          },
          {
            "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA50",
            "refsource": "CONFIRM",
            "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
          },
          {
            "name": "ADV-2010-1216",
            "refsource": "VUPEN",
            "url": "http://www.vupen.com/english/advisories/2010/1216"
          },
          {
            "name": "42733",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/42733"
          },
          {
            "name": "37291",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/37291"
          },
          {
            "name": "FEDORA-2010-5744",
            "refsource": "FEDORA",
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
          },
          {
            "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc",
            "refsource": "CONFIRM",
            "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
          },
          {
            "name": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html",
            "refsource": "MISC",
            "url": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "0.9.8l",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3245"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSA:2010-060-02",
              "refsource": "SLACKWARE",
              "tags": [],
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049"
            },
            {
              "name": "[openssl-cvs] 20100223 OpenSSL: openssl/crypto/bn/ bn_div.c bn_gf2m.c openssl/crypto/ec...",
              "refsource": "MLIST",
              "tags": [
                "Patch"
              ],
              "url": "http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2"
            },
            {
              "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_0_9_8-stable: openssl/ CHANGES openssl/crypto/b...",
              "refsource": "MLIST",
              "tags": [
                "Patch"
              ],
              "url": "http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2"
            },
            {
              "name": "38761",
              "refsource": "SECUNIA",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "http://secunia.com/advisories/38761"
            },
            {
              "name": "[openssl-cvs] 20100223 OpenSSL: OpenSSL_1_0_0-stable: openssl/crypto/bn/ bn_div.c bn_gf...",
              "refsource": "MLIST",
              "tags": [
                "Patch"
              ],
              "url": "http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2"
            },
            {
              "name": "38562",
              "refsource": "BID",
              "tags": [],
              "url": "http://www.securityfocus.com/bid/38562"
            },
            {
              "name": "ADV-2010-0839",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/0839"
            },
            {
              "name": "FEDORA-2010-5744",
              "refsource": "FEDORA",
              "tags": [],
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
            },
            {
              "name": "MDVSA-2010:076",
              "refsource": "MANDRIVA",
              "tags": [],
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
            },
            {
              "name": "ADV-2010-0933",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/0933"
            },
            {
              "name": "ADV-2010-0916",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/0916"
            },
            {
              "name": "39461",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/39461"
            },
            {
              "name": "FEDORA-2010-5357",
              "refsource": "FEDORA",
              "tags": [],
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
            },
            {
              "name": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
            },
            {
              "name": "39932",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/39932"
            },
            {
              "name": "ADV-2010-1216",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2010/1216"
            },
            {
              "name": "SUSE-SR:2010:013",
              "refsource": "SUSE",
              "tags": [],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
            },
            {
              "name": "USN-1003-1",
              "refsource": "UBUNTU",
              "tags": [],
              "url": "http://www.ubuntu.com/usn/USN-1003-1"
            },
            {
              "name": "RHSA-2010:0977",
              "refsource": "REDHAT",
              "tags": [],
              "url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
            },
            {
              "name": "42724",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/42724"
            },
            {
              "name": "42733",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/42733"
            },
            {
              "name": "https://kb.bluecoat.com/index?page=content\u0026id=SA50",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
            },
            {
              "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
            },
            {
              "name": "[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
            },
            {
              "name": "APPLE-SA-2011-06-23-1",
              "refsource": "APPLE",
              "tags": [],
              "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
            },
            {
              "name": "http://support.apple.com/kb/HT4723",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://support.apple.com/kb/HT4723"
            },
            {
              "name": "RHSA-2011:0896",
              "refsource": "REDHAT",
              "tags": [],
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
            },
            {
              "name": "37291",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/37291"
            },
            {
              "name": "SSRT100058",
              "refsource": "HP",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
            },
            {
              "name": "HPSBOV02540",
              "refsource": "HP",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2"
            },
            {
              "name": "oval:org.mitre.oval:def:9790",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790"
            },
            {
              "name": "oval:org.mitre.oval:def:6640",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640"
            },
            {
              "name": "oval:org.mitre.oval:def:11738",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738"
            },
            {
              "name": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html",
              "refsource": "MISC",
              "tags": [],
              "url": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": true,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 10.0,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "HIGH",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2017-09-19T01:29Z",
      "publishedDate": "2010-03-05T19:30Z"
    }
  }
}
  fkie_cve-2009-3245
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html | ||
| cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html | ||
| cve@mitre.org | http://marc.info/?l=bugtraq&m=127128920008563&w=2 | ||
| cve@mitre.org | http://marc.info/?l=bugtraq&m=127678688104458&w=2 | ||
| cve@mitre.org | http://marc.info/?l=openssl-cvs&m=126692159706582&w=2 | Patch | |
| cve@mitre.org | http://marc.info/?l=openssl-cvs&m=126692170906712&w=2 | Patch | |
| cve@mitre.org | http://marc.info/?l=openssl-cvs&m=126692180606861&w=2 | Patch | |
| cve@mitre.org | http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html | ||
| cve@mitre.org | http://secunia.com/advisories/37291 | ||
| cve@mitre.org | http://secunia.com/advisories/38761 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/39461 | ||
| cve@mitre.org | http://secunia.com/advisories/39932 | ||
| cve@mitre.org | http://secunia.com/advisories/42724 | ||
| cve@mitre.org | http://secunia.com/advisories/42733 | ||
| cve@mitre.org | http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049 | ||
| cve@mitre.org | http://support.apple.com/kb/HT4723 | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2010:076 | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2010-0977.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2011-0896.html | ||
| cve@mitre.org | http://www.securityfocus.com/bid/38562 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-1003-1 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2010/0839 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2010/0916 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2010/0933 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2010/1216 | ||
| cve@mitre.org | https://kb.bluecoat.com/index?page=content&id=SA50 | ||
| cve@mitre.org | https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html | ||
| cve@mitre.org | https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127128920008563&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127678688104458&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=openssl-cvs&m=126692159706582&w=2 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=openssl-cvs&m=126692170906712&w=2 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=openssl-cvs&m=126692180606861&w=2 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37291 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38761 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39461 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/39932 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42724 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42733 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4723 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2010:076 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2010-0977.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0896.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/38562 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1003-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0839 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0916 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0933 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/1216 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.bluecoat.com/index?page=content&id=SA50 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790 | 
| Vendor | Product | Version | |
|---|---|---|---|
| openssl | openssl | * | |
| openssl | openssl | 0.9.8 | |
| openssl | openssl | 0.9.8a | |
| openssl | openssl | 0.9.8b | |
| openssl | openssl | 0.9.8c | |
| openssl | openssl | 0.9.8d | |
| openssl | openssl | 0.9.8e | |
| openssl | openssl | 0.9.8f | |
| openssl | openssl | 0.9.8g | |
| openssl | openssl | 0.9.8h | |
| openssl | openssl | 0.9.8i | |
| openssl | openssl | 0.9.8j | |
| openssl | openssl | 0.9.8k | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81FB3B26-CC83-4FA5-BDE1-05F35AB99741",
              "versionEndIncluding": "0.9.8l",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A4E446D-B9D3-45F2-9722-B41FA14A6C31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF4EA988-FC80-4170-8933-7C6663731981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F8F53B-24A1-4877-B16E-F1917C4E4E81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
              "matchCriteriaId": "75D3ACD5-905F-42BB-BE1A-8382E9D823BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
              "matchCriteriaId": "766EA6F2-7FA4-4713-9859-9971CCD2FDCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFBC30B7-627D-48DC-8EF0-AE8FA0C6EDBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BB38AEA-BAF0-4920-9A71-747C24444770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F33EA2B-DE15-4695-A383-7A337AC38908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
              "matchCriteriaId": "261EE631-AB43-44FE-B02A-DFAAB8D35927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0E0BBF-D0BE-41A7-B9BB-C28F01000BC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A1365ED-4651-4AB2-A64B-43782EA2F0E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC82690C-DCED-47BA-AA93-4D0C9E95B806",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors."
    },
    {
      "lang": "es",
      "value": "OpenSSL en versiones anterioes a v0.9.8m cuando recibe un valor de retorno NULL de la funcion bn_wexpand hace una llamada a (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, y (4) engines/e_ubsec.c, lo que tiene un impacto inespecifico y vectores de ataque dependientes del contexto."
    }
  ],
  "id": "CVE-2009-3245",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-03-05T19:30:00.343",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/37291"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38761"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/39461"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/39932"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42724"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42733"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/38562"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1003-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0839"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0916"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0933"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/1216"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038587.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127128920008563\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=127678688104458\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692159706582\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692170906712\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://marc.info/?l=openssl-cvs\u0026m=126692180606861\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/153392/ABB-HMI-Outdated-Software-Components.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38761"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42733"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.663049"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0977.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0896.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/38562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1003-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA50"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11738"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6640"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9790"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-3245\n\nThis issue was fixed in openssl packages in Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2010-0162.html\n\nThis issue was fixed in openssl096b packages in Red Hat Enterprise Linux 3 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0173.html\n\nThe Red Hat Security Response Team has rated this issue as having low security impact on openssl packages in Red Hat Enterprise Linux 3 and 4, a future update may address this flaw.",
      "lastModified": "2010-03-25T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.