var-200309-0035
Vulnerability from variot
A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. While the full impact of these vulnerabilities are unclear, they may lead to memory corruption and a denial-of-service situation. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ OpenSSH Project More distributed OpenSSH 3.7 (Portable Edition OpenSSH 3.7p1) Previously, there were deficiencies in buffer management. If a remote attacker receives a packet of a deliberate length that frees other nearby areas when releasing the buffer, the heap area can be destroyed. As a result, remote attackers who exploit this issue sshd Can be put into a denial of service, and arbitrary code execution has been suggested. The routine in which the problem exists is OpenSSH Others that are using similar routines since being used since the initial release of SSH The implementation of may also be affected. SSH Secure Shell/Ciso IOS Has been reported by the vendor to be unaffected by this issue. Also, F-Secure SSH about, 1.3.14 (for Unix) Previously affected, 2.x Since then, the vendor has reported that it will not be affected. Initially this problem (CAN-2003-0693) Is buffer.c Inside buffer_append_space() Discovered in the function, OpenSSH 3.7p1 It was solved with. However, since a similar problem was discovered in other places after that, this problem was solved. OpenSSH 3.7.1p1 Has been released. (CAN-2003-0695) In addition, memory management issues that are different from the above issues (CAN-2003-0682) Has also been reported, OpenSSH 3.7.1p2 It can be solved by updating to. still, Red Hat Linux About the vendor 2003 Year 9 Moon 17 Advisory published by date (RHSA-2003:279-17) Indicated in RPM Updates to the package, Turboinux About the vendor 2003 Year 9 Moon 24 Advisory published on date (TLSA-2003-53) All of these issues are due to updates to the packages indicated in (CAN-2003-0682/CAN-2003-0693/CAN-2003-0695) Can be eliminated.Please refer to the “Overview” for the impact of this vulnerability. The issue may cause a denial of service. This condition can reportedly be triggered by an overly large packet. There are also unconfirmed rumors of an exploit for this vulnerability circulating in the wild. OpenSSH has revised their advisory, pointing out a similar issue in the 'channels.c' source file and an additional issue in 'buffer.c'. Solar Designer has also reportedly pointed out additional instances of the problem that may also present vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200309-0035", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "catos", "scope": "eq", "trust": 3.3, "vendor": "cisco", "version": "5.5" }, { "model": "catos", "scope": "eq", "trust": 2.7, "vendor": "cisco", "version": "6.1" }, { "model": "catos csx", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "5.3" }, { "model": "catalyst csx", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "60005.3" }, { "model": null, "scope": null, "trust": 1.6, "vendor": "mandriva", "version": null }, { "model": "catos", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "6.3" }, { "model": "catos csx", "scope": "eq", "trust": 1.2, "vendor": "cisco", "version": "5.2" }, { "model": "openssh", "scope": "lte", "trust": 1.0, "vendor": "openbsd", "version": "3.7" }, { "model": "catos", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "6.2" }, { "model": "catos", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "5.4" }, { "model": "catos", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "5.1" }, { "model": "catos", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "4.5" }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "60006.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "60005.5" }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "50006.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "40006.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "40005.1" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "appgate network security ab", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cray", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cyclades", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "f secure", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "foundry", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "guardian digital", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm eserver", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ingrian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mirapoint", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "network appliance", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nokia", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openpkg", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openssh", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "openwall gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "riverstone", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tfs", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "openssh", "scope": "eq", "trust": 0.8, "vendor": "openbsd", "version": "3.7.1p1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "1.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "cobalt raq550", "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "6.5" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.04" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.1" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.2" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.3" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "8.0" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "9" }, { "model": "catos", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.1" }, { "model": "catos csx", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "50005.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "50004.5" }, { "model": "catalyst", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "40005.5" }, { "model": "catalyst", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "40005.2" }, { "model": "openssh", "scope": "eq", "trust": 0.6, "vendor": "openbsd", "version": "3.7" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "cobalt raq", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "550" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.9" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.8" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.6" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.5" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.4" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7.1" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.7" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.3" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.6.2" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.18" }, { "model": "stonegate", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "1.5.17" }, { "model": "os", "scope": "eq", "trust": 0.3, "vendor": "snapgear", "version": "1.8.4" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.22" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.21" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.20" }, { "model": "irix m", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix f", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "irix", "scope": "eq", "trust": 0.3, "vendor": "sgi", "version": "6.5.19" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "openssh-server-3.5p1-6.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-server-3.4p1-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-server-3.1p1-3.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-server-2.9p2-7.ia64.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-server-2.9p2-7.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-server-2.5.2p2-5.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-clients-3.5p1-6.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-clients-3.4p1-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-clients-3.1p1-3.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-clients-2.9p2-7.ia64.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-clients-2.9p2-7.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-clients-2.5.2p2-5.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-gnome-3.5p1-6.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-gnome-3.4p1-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-gnome-3.1p1-3.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-gnome-2.9p2-7.ia64.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-gnome-2.9p2-7.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-gnome-2.5.2p2-5.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-3.5p1-6.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-3.4p1-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-3.1p1-3.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-2.9p2-7.ia64.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-2.9p2-7.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-askpass-2.5.2p2-5.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-3.5p1-6.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-3.4p1-2.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-3.1p1-3.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-2.9p2-7.ia64.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-2.9p2-7.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "openssh-2.5.2p2-5.i386.rpm", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.7" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.7" }, { "model": "p2", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.6.1" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.6.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.6.1" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.5" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.5" }, { "model": "p1-1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.4" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.4" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.4" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.3" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.3" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.2.3" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.2.2" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.2" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.1" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.0.2" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.0.2" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.0.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.0.1" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "3.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "2.9.9" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.3" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.2" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.6.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.6" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.5.3" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.5.2" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.5.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "1.5" }, { "model": "secureadmin for netcache", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "5.5" }, { "model": "secureadmin", "scope": "eq", "trust": 0.3, "vendor": "netapp", "version": "3.0" }, { "model": "networks serverironxl/g", "scope": null, "trust": 0.3, "vendor": "foundry", "version": null }, { "model": "networks serverironxl", "scope": null, "trust": 0.3, "vendor": "foundry", "version": null }, { "model": "networks serveriron800", "scope": null, "trust": 0.3, "vendor": "foundry", "version": null }, { "model": "networks serveriron400", "scope": null, "trust": 0.3, "vendor": "foundry", "version": null }, { "model": "networks serveriron", "scope": "eq", "trust": 0.3, "vendor": "foundry", "version": "7.1.09" }, { "model": "networks serveriron", "scope": "eq", "trust": 0.3, "vendor": "foundry", "version": "6.0" }, { "model": "networks serveriron t12", "scope": "eq", "trust": 0.3, "vendor": "foundry", "version": "5.1.10" }, { "model": "networks ironview", "scope": null, "trust": 0.3, "vendor": "foundry", "version": null }, { "model": "networks fastiron", "scope": "eq", "trust": 0.3, "vendor": "foundry", "version": "7.1.09" }, { "model": "networks edgeiron 4802f", "scope": "eq", "trust": 0.3, "vendor": "foundry", "version": "0" }, { "model": "networks bigiron", "scope": "eq", "trust": 0.3, "vendor": "foundry", "version": "7.1.09" }, { "model": "ssh", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "1.3.14" }, { "model": "open software", "scope": "eq", "trust": 0.3, "vendor": "cray", "version": "3.0" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.20.0.03" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.10.2.06" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.10.1.02" }, { "model": "webns b4", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.10" }, { "model": "webns", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.10" }, { "model": "sn storage router sn5428-3.3.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.3.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.2.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-3.2.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2.5.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2-3.3.2-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "sn storage router sn5428-2-3.3.1-k9", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5428" }, { "model": "secure intrusion detection system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "pgw2200 softswitch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "css11800 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11506 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11503 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11501 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11150 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11050 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ciscoworks wireless lan solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1105" }, { "model": "ciscoworks hosting solution engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1105" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.6" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4(0.63)" }, { "model": "catos clr", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.4" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.3" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(0.65)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.4(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.4(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.4(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(9)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(8.3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(8)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(7)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(6)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(5.10)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(5)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(4)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3)x1" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3)x" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(10)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(4)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(9)" }, { "model": "catos cv", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(8)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(7)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(6)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(5)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(4)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(19)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(18)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(17)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(16.2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(16)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(15)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(14)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(13.5)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(13)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(12)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(11)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(10)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.5(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.4(4)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.4(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.4(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.4(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(7)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(6)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(5)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(4)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(9)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(8)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(7)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(6)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(5)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(4)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(13)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(12)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(11)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(10)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.4(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.3" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2(1)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(3)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "catos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "catalyst ws-x6380-nam", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "76003.1" }, { "model": "catalyst ws-svc-nam-2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "76003.1" }, { "model": "catalyst ws-svc-nam-1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "76003.1" }, { "model": "catalyst ws-svc-nam-2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "76002.2" }, { "model": "catalyst ws-svc-nam-1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "76002.2" }, { "model": "catalyst ws-x6380-nam", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "76002.1" }, { "model": "catalyst ws-x6380-nam", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "65003.1" }, { "model": "catalyst ws-svc-nam-2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "65003.1" }, { "model": "catalyst ws-svc-nam-1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "65003.1" }, { "model": "catalyst ws-svc-nam-2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "65002.2" }, { "model": "catalyst ws-svc-nam-1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "65002.2" }, { "model": "catalyst ws-x6380-nam", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "65002.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60007.6(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60007.5(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60007.1(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60007.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.3(4)" }, { "model": "catalyst pan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.3" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.2(0.111)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.2(0.110)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.1(2.13)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.1(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(13)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4" }, { "model": "catalyst ws-x6380-nam", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60003.1" }, { "model": "catalyst ws-svc-nam-2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60003.1" }, { "model": "catalyst ws-svc-nam-1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60003.1" }, { "model": "catalyst ws-svc-nam-2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60002.2" }, { "model": "catalyst ws-svc-nam-1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60002.2" }, { "model": "catalyst ws-x6380-nam", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60002.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50006.3(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50006.1(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50006.1(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50006.1(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.5(7)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.5(6)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.5" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.5(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.5(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.5(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.5(13)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.5(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.4.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.4(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.4(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.4(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.4(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.2(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.2(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.2(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.2(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.2" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.1(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(9)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(8)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(7)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(6)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(5)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(12)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(11)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.5(10)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "catalyst 4912g", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40007.6(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40007.5(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40007.1.2" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40007.1(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40007.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40006.3.5" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40006.3(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40006.1(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.5.5" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.5(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.5(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.5(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.5(13)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.5(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.4.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.4(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.4(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.4(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.4" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.2(7)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.2(6)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.2(5)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.2(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.2(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.2(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40005.1(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(9)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(8)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(7)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(6)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(5)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40004.5(10)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4000" }, { "model": "catalyst 2948g", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "29005.5(13)" }, { "model": "catalyst 2980g-a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "catalyst 2980g", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openlinux workstation", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "3.1.1" }, { "model": "openlinux server", "scope": "eq", "trust": 0.3, "vendor": "caldera", "version": "3.1.1" }, { "model": "coat systems sgme", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "2.1.6" }, { "model": "coat systems sg2 secure proxy", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "0" }, { "model": "coat systems security gateway os", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "3.1" }, { "model": "coat systems security gateway os sp1", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "2.1.5001" }, { "model": "coat systems security gateway os", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "2.1.9" }, { "model": "coat systems proxysg", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "0" }, { "model": "coat systems cacheos ca/sa", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.10" }, { "model": "os", "scope": "ne", "trust": 0.3, "vendor": "snapgear", "version": "1.8.5" }, { "model": "irix", "scope": "ne", "trust": 0.3, "vendor": "sgi", "version": "6.5.22" }, { "model": "p1", "scope": "ne", "trust": 0.3, "vendor": "openssh", "version": "3.7.1" }, { "model": "openssh", "scope": "ne", "trust": 0.3, "vendor": "openssh", "version": "3.7.1" }, { "model": "p1", "scope": "ne", "trust": 0.3, "vendor": "openssh", "version": "3.7" }, { "model": "openssh", "scope": "ne", "trust": 0.3, "vendor": "openssh", "version": "3.7" }, { "model": "ssh", "scope": "ne", "trust": 0.3, "vendor": "f secure", "version": "1.3.15" }, { "model": "catos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.1(3)" } ], "sources": [ { "db": "CERT/CC", "id": "VU#333628" }, { "db": "BID", "id": "8628" }, { "db": "JVNDB", "id": "JVNDB-2003-000274" }, { "db": "CNNVD", "id": "CNNVD-200309-032" }, { "db": "NVD", "id": "CVE-2003-0693" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:openbsd:openssh", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550", "vulnerable": true }, { "cpe22Uri": "cpe:/o:sun:solaris", "vulnerable": true }, { "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:hp-ux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:linux", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000274" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSH Security Advisory", "sources": [ { "db": "CNNVD", "id": "CNNVD-200309-032" } ], "trust": 0.6 }, "cve": "CVE-2003-0693", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2003-0693", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2003-0693", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#333628", "trust": 0.8, "value": "28.98" }, { "author": "NVD", "id": "CVE-2003-0693", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200309-032", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#333628" }, { "db": "JVNDB", "id": "JVNDB-2003-000274" }, { "db": "CNNVD", "id": "CNNVD-200309-032" }, { "db": "NVD", "id": "CVE-2003-0693" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A \"buffer management error\" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. While the full impact of these vulnerabilities are unclear, they may lead to memory corruption and a denial-of-service situation. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ OpenSSH Project More distributed OpenSSH 3.7 (Portable Edition OpenSSH 3.7p1) Previously, there were deficiencies in buffer management. If a remote attacker receives a packet of a deliberate length that frees other nearby areas when releasing the buffer, the heap area can be destroyed. As a result, remote attackers who exploit this issue sshd Can be put into a denial of service, and arbitrary code execution has been suggested. The routine in which the problem exists is OpenSSH Others that are using similar routines since being used since the initial release of SSH The implementation of may also be affected. SSH Secure Shell/Ciso IOS Has been reported by the vendor to be unaffected by this issue. Also, F-Secure SSH about, 1.3.14 (for Unix) Previously affected, 2.x Since then, the vendor has reported that it will not be affected. Initially this problem (CAN-2003-0693) Is buffer.c Inside buffer_append_space() Discovered in the function, OpenSSH 3.7p1 It was solved with. However, since a similar problem was discovered in other places after that, this problem was solved. OpenSSH 3.7.1p1 Has been released. (CAN-2003-0695) In addition, memory management issues that are different from the above issues (CAN-2003-0682) Has also been reported, OpenSSH 3.7.1p2 It can be solved by updating to. still, Red Hat Linux About the vendor 2003 Year 9 Moon 17 Advisory published by date (RHSA-2003:279-17) Indicated in RPM Updates to the package, Turboinux About the vendor 2003 Year 9 Moon 24 Advisory published on date (TLSA-2003-53) All of these issues are due to updates to the packages indicated in (CAN-2003-0682/CAN-2003-0693/CAN-2003-0695) Can be eliminated.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. The issue may cause a denial of service. This condition can reportedly be triggered by an overly large packet. \nThere are also unconfirmed rumors of an exploit for this vulnerability circulating in the wild. \nOpenSSH has revised their advisory, pointing out a similar issue in the \u0027channels.c\u0027 source file and an additional issue in \u0027buffer.c\u0027. Solar Designer has also reportedly pointed out additional instances of the problem that may also present vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2003-0693" }, { "db": "CERT/CC", "id": "VU#333628" }, { "db": "JVNDB", "id": "JVNDB-2003-000274" }, { "db": "BID", "id": "8628" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#333628", "trust": 3.2 }, { "db": "NVD", "id": "CVE-2003-0693", "trust": 2.7 }, { "db": "XF", "id": "13191", "trust": 1.4 }, { "db": "BID", "id": "8628", "trust": 1.1 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2024/07/01/3", "trust": 1.0 }, { "db": "SECUNIA", "id": "10156", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2003-000274", "trust": 0.8 }, { "db": "FULLDISC", "id": "20030916 THE LOWDOWN ON SSH VULNERABILITY", "trust": 0.6 }, { "db": "FULLDISC", "id": "20030915 NEW SSH EXPLOIT?", "trust": 0.6 }, { "db": "FULLDISC", "id": "20030915 OPENSSH REMOTE EXPLOIT", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:447", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:2719", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030916 OPENSSH BUFFER MANAGEMENT BUG ADVISORY", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030917 [OPENPKG-SA-2003.040] OPENPKG SECURITY ADVISORY (OPENSSH)", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20030916 [SLACKWARE-SECURITY] OPENSSH SECURITY ADVISORY (SSA:2003-259-01)", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2003:090", "trust": 0.6 }, { "db": "CERT/CC", "id": "CA-2003-24", "trust": 0.6 }, { "db": "SUNALERT", "id": "1000620", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-383", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-382", "trust": 0.6 }, { "db": "TRUSTIX", "id": "2003-0033", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:280", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2003:279", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200309-032", "trust": 0.6 } ], "sources": [ { "db": "CERT/CC", "id": "VU#333628" }, { "db": "BID", "id": "8628" }, { "db": "JVNDB", "id": "JVNDB-2003-000274" }, { "db": "CNNVD", "id": "CNNVD-200309-032" }, { "db": "NVD", "id": "CVE-2003-0693" } ] }, "id": "VAR-200309-0035", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.38200912 }, "last_update_date": "2024-11-29T21:59:58.812000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "2003120401", "trust": 0.8, "url": "http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-2003120401.shtml" }, { "title": "HPSBUX0311-302", "trust": 0.8, "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0311-302" }, { "title": "HPSBUX0309-282", "trust": 0.8, "url": "http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0309-282" }, { "title": "HPSBUX0311-302", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX0311-302.html" }, { "title": "HPSBUX0309-282", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX0309-282.html" }, { "title": "openssh", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/openssh.html" }, { "title": "buffer.adv", "trust": 0.8, "url": "http://www.openssh.com/txt/buffer.adv" }, { "title": "RHSA-2003:279", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2003-279.html" }, { "title": "471", "trust": 0.8, "url": "http://www.ssh.com/company/newsroom/article/471/" }, { "title": "56862", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56862-1" }, { "title": "56861", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56861-1" }, { "title": "56862", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56862-3" }, { "title": "56861", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56861-3" }, { "title": "550 OpenSSH Security Update", "trust": 0.8, "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage" }, { "title": "TLSA-2003-53", "trust": 0.8, "url": "http://www.turbolinux.com/security/2003/TLSA-2003-53.txt" }, { "title": "TLSA-2003-51", "trust": 0.8, "url": "http://www.turbolinux.com/security/2003/TLSA-2003-51.txt" }, { "title": "RHSA-2003:279", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-279J.html" }, { "title": "TLSA-2003-53", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-53j.txt" }, { "title": "TLSA-2003-51", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-51j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2003-000274" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2003-0693" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.7, "url": "http://www.openssh.com/txt/buffer.adv" }, { "trust": 3.7, "url": "http://www.cert.org/advisories/ca-2003-24.html" }, { "trust": 3.4, "url": "http://www.kb.cert.org/vuls/id/333628" }, { "trust": 2.6, "url": "http://www.redhat.com/support/errata/rhsa-2003-280.html" }, { "trust": 2.6, "url": "http://www.debian.org/security/2003/dsa-383" }, { "trust": 2.6, "url": "http://www.debian.org/security/2003/dsa-382" }, { "trust": 2.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000620.1-1" }, { "trust": 2.6, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010146.html" }, { "trust": 2.6, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010135.html" }, { "trust": 2.6, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010103.html" }, { "trust": 2.6, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2003:090" }, { "trust": 2.0, "url": "http://marc.info/?l=bugtraq\u0026m=106373247528528\u0026w=2" }, { "trust": 2.0, "url": "http://marc.info/?l=bugtraq\u0026m=106373546332230\u0026w=2" }, { "trust": 2.0, "url": "http://marc.info/?l=bugtraq\u0026m=106374466212309\u0026w=2" }, { "trust": 2.0, "url": "http://marc.info/?l=bugtraq\u0026m=106381396120332\u0026w=2" }, { "trust": 2.0, "url": "http://marc.info/?l=bugtraq\u0026m=106381409220492\u0026w=2" }, { "trust": 2.0, "url": "http://www.openwall.com/lists/oss-security/2024/07/01/3" }, { "trust": 2.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13191" }, { "trust": 2.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2719" }, { "trust": 2.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a447" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/13191" }, { "trust": 1.2, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106373247528528\u0026w=2" }, { "trust": 0.8, "url": "http://www.mindrot.org/pipermail/openssh-unix-announce/2003-september/000062.html" }, { "trust": 0.8, "url": "http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/openssh/files/patch-buffer.c" }, { "trust": 0.8, "url": "http://www.secunia.com/advisories/10156/" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/n-151.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0693" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/wr/2003/wr033801.txt" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnca-2003-24" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trca-2003-24" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0693" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/8628" }, { "trust": 0.8, "url": "http://www.isskk.co.jp/support/techinfo/general/openssh144.html" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106381409220492\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106381396120332\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106374466212309\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106373546332230\u0026w=2" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:447" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2719" }, { "trust": 0.3, "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2003\u0026m=slackware-security.368193" }, { "trust": 0.3, "url": "http://www.bluecoat.com/downloads/support/bcs_openssh_vulnerability.pdf" }, { "trust": 0.3, "url": "http://www.openwall.com/owl/changes-current.shtml" }, { "trust": 0.3, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20030917-openssh.shtml" }, { "trust": 0.3, "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000739" }, { "trust": 0.3, "url": "http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssh/buffer.c.diff?r1=1.1.1.6\u0026r2=1.1.1.7\u0026f=h" }, { "trust": 0.3, "url": "http://www.f-secure.com/support/technical/ssh/ssh1_openssh_buffer_management.shtml" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm" }, { "trust": 0.3, "url": "http://www.netapp.com/support/" }, { "trust": 0.3, "url": "http://www.stonesoft.com/document/art/3031.html" }, { "trust": 0.3, "url": "http://www.foundrynet.com/solutions/advisories/openssh333628.html" }, { "trust": 0.3, "url": "http://www.netscreen.com/services/security/alerts/openssh_1.jsp" }, { "trust": 0.3, "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967067.htm" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56861" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56862" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026nav=patchpage" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/patches/linux/security.html" }, { "trust": 0.3, "url": "http://www.yellowdoglinux.com/resources/errata/ydu-20030917-1.txt" }, { "trust": 0.3, "url": "/archive/1/337921" } ], "sources": [ { "db": "CERT/CC", "id": "VU#333628" }, { "db": "BID", "id": "8628" }, { "db": "JVNDB", "id": "JVNDB-2003-000274" }, { "db": "CNNVD", "id": "CNNVD-200309-032" }, { "db": "NVD", "id": "CVE-2003-0693" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#333628" }, { "db": "BID", "id": "8628" }, { "db": "JVNDB", "id": "JVNDB-2003-000274" }, { "db": "CNNVD", "id": "CNNVD-200309-032" }, { "db": "NVD", "id": "CVE-2003-0693" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-09-16T00:00:00", "db": "CERT/CC", "id": "VU#333628" }, { "date": "2003-09-16T00:00:00", "db": "BID", "id": "8628" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000274" }, { "date": "2003-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-200309-032" }, { "date": "2003-09-22T04:00:00", "db": "NVD", "id": "CVE-2003-0693" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-08-12T00:00:00", "db": "CERT/CC", "id": "VU#333628" }, { "date": "2009-11-05T23:47:00", "db": "BID", "id": "8628" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2003-000274" }, { "date": "2006-03-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200309-032" }, { "date": "2024-11-20T23:45:18.870000", "db": "NVD", "id": "CVE-2003-0693" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200309-032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSH contains buffer management errors", "sources": [ { "db": "CERT/CC", "id": "VU#333628" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "8628" }, { "db": "CNNVD", "id": "CNNVD-200309-032" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.