2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-0988" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-05-02T04:00:00.000" ,
2024-11-21 23:11:37 +00:00
"lastModified" : "2024-11-20T23:56:20.520" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:H/Au:N/C:P/I:P/A:P" ,
2024-11-21 23:11:37 +00:00
"baseScore" : 3.7 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-21 23:11:37 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 1.9 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D50385A-1D5D-4517-B5FA-1BB60BA4C484"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "752BDD31-53A2-4246-8E95-77694548DB2B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "079F39E2-69BF-47AC-87CF-A47D37EA27F8"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0A585A1-FF82-418F-90F8-072458DB7816"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "E3F7EB61-55A5-4776-B0E7-3508920A6CEA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "A442DE97-4485-4D95-B95D-58947585E455"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AE31DFF8-06AB-489D-A0C5-509C090283B5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E8A6564-129A-4555-A5ED-6F65C56AE7B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "237174A4-E030-4A0B-AD0B-5C463603EAA4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DF49BF03-C25E-4737-84D5-892895C86C58"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D7F8F11-1869-40E2-8478-28B4E946D3CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2019E0E-426B-43AF-8904-1B811AE171E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "9062BAB5-D437-49BE-A384-39F62434B70B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*" ,
"matchCriteriaId" : "3BA1504C-14FE-4C21-A801-944041F2946F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "21B69535-4FB6-4FAD-AAA6-C790FF82EFAF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E53C673-9D6D-42C8-A502-033E1FC28D97"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "55C5FC1A-1253-4390-A4FC-573BB14EA937"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F4AC452-6042-409D-8673-ACAD108EE3B5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "2FE1009B-371A-48E2-A456-935A1F0B7D0D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "C844A170-B5A7-4703-AF3B-67366D44EA8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44308D13-D935-4FF8-AB52-F0E115ED1AD2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "3D41CB12-7894-4D25-80EC-23C56171D973"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BCD9C12-EDAB-473F-9CC5-04F06B413720"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "09789843-6A1A-4CDB-97E8-89E82B79DDB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C001822-FDF8-497C-AC2C-B59A00E9ACD2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "118211EF-CED7-4EB5-9669-F54C8169D4AE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*" ,
"matchCriteriaId" : "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A405AE2-ECC4-4BB0-80DD-4736394FB217"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B86C77AB-B8FF-4376-9B4E-C88417396F3D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5612FB0-8403-4A7E-B89A-D7BDFAC00078"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "AFDA151E-E614-4A24-A34D-B6D5309110CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "441BE3A0-20F4-4972-B279-19B3DB5FA14D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*" ,
"matchCriteriaId" : "09BFA20B-2F31-4246-8F74-63DF1DB884EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "00EAEA17-033A-4A50-8E39-D61154876D2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AE93D3D-34B4-47B7-A784-61F4479FF5A2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FFD9D1C-A459-47AD-BC62-15631417A32F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*" ,
"matchCriteriaId" : "6E21E50A-A368-4487-A791-87366CC5C86E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "43E84296-9B5C-4623-A2C4-431D76FC2765"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "E18328E2-3CB5-4D36-8EA3-77DD909B46A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF73D76B-FBB8-4D10-8393-9FAF53392A4B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "F177AE1C-58C2-4575-807C-ABFFC5119FA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B13D898-C1B6-44B9-8432-7DDB8A380E9E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*" ,
"matchCriteriaId" : "51A612F6-E4EB-4E34-8F55-79E16C74758E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C19B266-8FE7-49ED-8678-2D522257491D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*" ,
"matchCriteriaId" : "15C4D826-A419-45F5-B91C-1445DB480916"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D9F2B04-A1F2-4788-A53D-C8274A758DDA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A5309ED-D84F-4F52-9864-5B0FEEEE5022"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD7C441E-444B-4DF5-8491-86805C70FB99"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E4BC012-ADE4-468F-9A25-261CD8055694"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8A80E6A-6502-4A33-83BA-7DCC606D79AA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D6428EB-5E1A-41CB-979C-4C9402251D8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "2DCA9879-C9F5-475A-8EC9-04D151001C8D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A94132F-4C47-49CC-B03C-8756613E9A38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*" ,
"matchCriteriaId" : "46A60ED5-1D92-4B40-956F-D1801CAB9039"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F629879-66F0-427B-86D8-D740E0E3F6E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*" ,
"matchCriteriaId" : "C89129C5-A1DB-4018-B43A-C60C8E650080"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "647BA336-5538-4972-9271-383A0EC9378E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" ,
"matchCriteriaId" : "2641EE56-6F9D-400B-B456-877F4DA79B10"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" ,
"matchCriteriaId" : "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" ,
"matchCriteriaId" : "E0B458EA-495E-40FA-9379-C03757F7B1EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" ,
"matchCriteriaId" : "409E324A-C040-494F-A026-9DCAE01C07F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" ,
"matchCriteriaId" : "1728AB5D-55A9-46B0-A412-6F7263CAEB5A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" ,
"matchCriteriaId" : "6474B775-C893-491F-A074-802AFB1FEDD8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" ,
"matchCriteriaId" : "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" ,
"matchCriteriaId" : "EC79FF22-2664-4C40-B0B3-6D23B5F45162"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" ,
"matchCriteriaId" : "0EFE2E73-9536-41A9-B83B-0A06B54857F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" ,
"matchCriteriaId" : "F9440B25-D206-4914-9557-B5F030890DEC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" ,
"matchCriteriaId" : "E9933557-3BCA-4D92-AD4F-27758A0D3347"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" ,
"matchCriteriaId" : "10A60552-15A5-4E95-B3CE-99A4B26260C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7D74A418-50F0-42C0-ABBC-BBBE718FF025"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" ,
"matchCriteriaId" : "84A50ED3-FD0D-4038-B3E7-CC65D166C968"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*" ,
"matchCriteriaId" : "777F9EC0-2919-45CA-BFF8-78A02537C513"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A67735E5-E43E-4164-BDB2-ADC6E0288E9F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5AB70F82-52BB-4D0D-9A24-9AF67278466D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1267DA81-5D2A-4F5C-BF87-F46813E21E19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "74CD3CFE-7780-4BDC-B318-9B2D7B3B2DC4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "839D2945-1417-43F5-A526-A14C491CBCEE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E06DCF0D-3241-453A-A0E4-937FE25EC404"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B484D091-62DE-4EF2-AC54-26896CA8B315"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9428589A-0BD2-469E-978D-38239117D972"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" ,
"matchCriteriaId" : "6E94583A-5184-462E-9FC4-57B35DA06DA7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" ,
"matchCriteriaId" : "E905FAAD-37B6-4DD0-A752-2974F8336273"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*" ,
"matchCriteriaId" : "3BD12488-1ED8-4751-ABF5-3578D54750A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*" ,
"matchCriteriaId" : "AE3733CF-4C88-443C-9B90-6477C9C500D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*" ,
"matchCriteriaId" : "9C500A75-D75E-45B4-B582-0F0DF27C3C04"
}
]
}
]
}
] ,
"references" : [
{
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2005-357.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/18100" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/21253" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/22033" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2005/dsa-752" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/15487" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/394965" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/12996" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/19289" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3101" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" ,
"source" : "cve@mitre.org"
2024-11-21 23:11:37 +00:00
} ,
{
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2005-357.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/18100" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/21253" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/22033" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.debian.org/security/2005/dsa-752" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.osvdb.org/15487" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/394965" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/12996" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/19289" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3101" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
}
] ,
"vendorComments" : [
{
"organization" : "Red Hat" ,
"comment" : "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch." ,
"lastModified" : "2007-03-14T00:00:00"
2023-04-24 12:24:31 +02:00
}
]
}