fkie_cve-2004-0079
Vulnerability from fkie_nvd
Published
2004-11-23 05:00
Modified
2025-01-16 18:15
Summary
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
References
cve@mitre.orgftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.ascBroken Link
cve@mitre.orgftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascBroken Link
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtBroken Link
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834Broken Link
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=61798Broken Link
cve@mitre.orghttp://fedoranews.org/updates/FEDORA-2004-095.shtmlThird Party Advisory
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlMailing List
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlMailing List
cve@mitre.orghttp://lists.apple.com/mhonarc/security-announce/msg00045.htmlBroken Link
cve@mitre.orghttp://marc.info/?l=bugtraq&m=107953412903636&w=2Mailing List
cve@mitre.orghttp://marc.info/?l=bugtraq&m=108403806509920&w=2Mailing List
cve@mitre.orghttp://secunia.com/advisories/11139Broken Link
cve@mitre.orghttp://secunia.com/advisories/17381Broken Link
cve@mitre.orghttp://secunia.com/advisories/17398Broken Link
cve@mitre.orghttp://secunia.com/advisories/17401Broken Link
cve@mitre.orghttp://secunia.com/advisories/18247Broken Link
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200403-03.xmlThird Party Advisory
cve@mitre.orghttp://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524Broken Link
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2005-239.htmThird Party Advisory
cve@mitre.orghttp://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_USBroken Link
cve@mitre.orghttp://www.ciac.org/ciac/bulletins/o-101.shtmlBroken Link
cve@mitre.orghttp://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlBroken Link
cve@mitre.orghttp://www.debian.org/security/2004/dsa-465Third Party Advisory
cve@mitre.orghttp://www.kb.cert.org/vuls/id/288574Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.linuxsecurity.com/advisories/engarde_advisory-4135.htmlBroken Link
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2004:023Third Party Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_07_openssl.htmlBroken Link
cve@mitre.orghttp://www.openssl.org/news/secadv_20040317.txtThird Party Advisory
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.htmlMailing List
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-120.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-121.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-139.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-829.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-830.htmlBroken Link
cve@mitre.orghttp://www.securityfocus.com/bid/9899Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
cve@mitre.orghttp://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961Broken Link
cve@mitre.orghttp://www.trustix.org/errata/2004/0012Broken Link
cve@mitre.orghttp://www.uniras.gov.uk/vuls/2004/224012/index.htmBroken Link
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA04-078A.htmlBroken Link, Third Party Advisory, US Government Resource
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/15505Third Party Advisory, VDB Entry
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975Broken Link
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779Broken Link
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.ascBroken Link
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.ascBroken Link
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txtBroken Link
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834Broken Link
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=61798Broken Link
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/updates/FEDORA-2004-095.shtmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/mhonarc/security-announce/msg00045.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=107953412903636&w=2Mailing List
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=108403806509920&w=2Mailing List
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/11139Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17381Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17398Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17401Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18247Broken Link
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200403-03.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524Broken Link
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2005-239.htmThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_USBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.ciac.org/ciac/bulletins/o-101.shtmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-465Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/288574Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/advisories/engarde_advisory-4135.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2004:023Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_07_openssl.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.openssl.org/news/secadv_20040317.txtThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-120.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-121.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-139.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-829.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-830.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/9899Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0012Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.uniras.gov.uk/vuls/2004/224012/index.htmBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA04-078A.htmlBroken Link, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/15505Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975Broken Link
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779Broken Link
Impacted products
Vendor Product Version
cisco firewall_services_module *
cisco firewall_services_module 1.1.2
cisco firewall_services_module 1.1.3
cisco firewall_services_module 1.1_\(3.005\)
cisco firewall_services_module 2.1_\(0.208\)
hp aaa_server *
hp apache-based_web_server 2.0.43.00
hp apache-based_web_server 2.0.43.04
symantec clientless_vpn_gateway_4400 5.0
cisco ciscoworks_common_management_foundation 2.1
cisco ciscoworks_common_services 2.2
avaya converged_communications_server 2.0
avaya sg200 4.4
avaya sg200 4.31.29
avaya sg203 4.4
avaya sg203 4.31.29
avaya sg208 *
avaya sg208 4.4
avaya sg5 4.2
avaya sg5 4.3
avaya sg5 4.4
apple mac_os_x 10.3.3
apple mac_os_x_server 10.3.3
freebsd freebsd 4.8
freebsd freebsd 4.8
freebsd freebsd 4.9
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.1
freebsd freebsd 5.2
freebsd freebsd 5.2.1
hp hp-ux 8.05
hp hp-ux 11.00
hp hp-ux 11.11
hp hp-ux 11.23
openbsd openbsd 3.3
openbsd openbsd 3.4
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux 3.0
redhat enterprise_linux_desktop 3.0
redhat linux 7.2
redhat linux 7.3
redhat linux 8.0
sco openserver 5.0.6
sco openserver 5.0.7
cisco ios 12.1\(11\)e
cisco ios 12.1\(11b\)e
cisco ios 12.1\(11b\)e12
cisco ios 12.1\(11b\)e14
cisco ios 12.1\(13\)e9
cisco ios 12.1\(19\)e1
cisco ios 12.2\(14\)sy
cisco ios 12.2\(14\)sy1
cisco ios 12.2sy
cisco ios 12.2za
4d webstar 4.0
4d webstar 5.2
4d webstar 5.2.1
4d webstar 5.2.2
4d webstar 5.2.3
4d webstar 5.2.4
4d webstar 5.3
4d webstar 5.3.1
avaya intuity_audix *
avaya intuity_audix 5.1.46
avaya intuity_audix s3210
avaya intuity_audix s3400
avaya vsu 5
avaya vsu 5x
avaya vsu 100_r2.0.1
avaya vsu 500
avaya vsu 2000_r2.0.1
avaya vsu 5000_r2.0.1
avaya vsu 7500_r2.0.1
avaya vsu 10000_r2.0.1
checkpoint firewall-1 *
checkpoint firewall-1 2.0
checkpoint firewall-1 next_generation_fp0
checkpoint firewall-1 next_generation_fp1
checkpoint firewall-1 next_generation_fp2
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint provider-1 4.1
checkpoint vpn-1 next_generation_fp0
checkpoint vpn-1 next_generation_fp1
checkpoint vpn-1 next_generation_fp2
checkpoint vpn-1 vsx_ng_with_application_intelligence
cisco access_registrar *
cisco application_and_content_networking_software *
cisco css_secure_content_accelerator 1.0
cisco css_secure_content_accelerator 2.0
cisco css11000_content_services_switch *
cisco okena_stormwatch 3.2
cisco pix_firewall 6.2.2_.111
cisco threat_response *
cisco webns 6.10
cisco webns 6.10_b4
cisco webns 7.1_0.1.02
cisco webns 7.1_0.2.06
cisco webns 7.2_0.0.03
cisco webns 7.10
cisco webns 7.10_.0.06s
dell bsafe_ssl-j 3.0
dell bsafe_ssl-j 3.0.1
dell bsafe_ssl-j 3.1
hp wbem a.01.05.08
hp wbem a.02.00.00
hp wbem a.02.00.01
lite speed_technologies_litespeed_web_server 1.0.1
lite speed_technologies_litespeed_web_server 1.0.2
lite speed_technologies_litespeed_web_server 1.0.3
lite speed_technologies_litespeed_web_server 1.1
lite speed_technologies_litespeed_web_server 1.1.1
lite speed_technologies_litespeed_web_server 1.2.1
lite speed_technologies_litespeed_web_server 1.2.2
lite speed_technologies_litespeed_web_server 1.2_rc1
lite speed_technologies_litespeed_web_server 1.2_rc2
lite speed_technologies_litespeed_web_server 1.3
lite speed_technologies_litespeed_web_server 1.3.1
lite speed_technologies_litespeed_web_server 1.3_rc1
lite speed_technologies_litespeed_web_server 1.3_rc2
lite speed_technologies_litespeed_web_server 1.3_rc3
neoteris instant_virtual_extranet 3.0
neoteris instant_virtual_extranet 3.1
neoteris instant_virtual_extranet 3.2
neoteris instant_virtual_extranet 3.3
neoteris instant_virtual_extranet 3.3.1
novell edirectory 8.0
novell edirectory 8.5
novell edirectory 8.5.12a
novell edirectory 8.5.27
novell edirectory 8.6.2
novell edirectory 8.7
novell edirectory 8.7.1
novell edirectory 8.7.1
novell imanager 1.5
novell imanager 2.0
openssl openssl 0.9.6c
openssl openssl 0.9.6d
openssl openssl 0.9.6e
openssl openssl 0.9.6f
openssl openssl 0.9.6g
openssl openssl 0.9.6h
openssl openssl 0.9.6i
openssl openssl 0.9.6j
openssl openssl 0.9.6k
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7
openssl openssl 0.9.7a
openssl openssl 0.9.7b
openssl openssl 0.9.7c
redhat openssl 0.9.6-15
redhat openssl 0.9.6b-3
redhat openssl 0.9.7a-2
redhat openssl 0.9.7a-2
redhat openssl 0.9.7a-2
sgi propack 2.3
sgi propack 2.4
sgi propack 3.0
stonesoft servercluster 2.5
stonesoft servercluster 2.5.2
stonesoft stonebeat_fullcluster 1_2.0
stonesoft stonebeat_fullcluster 1_3.0
stonesoft stonebeat_fullcluster 2.0
stonesoft stonebeat_fullcluster 2.5
stonesoft stonebeat_fullcluster 3.0
stonesoft stonebeat_securitycluster 2.0
stonesoft stonebeat_securitycluster 2.5
stonesoft stonebeat_webcluster 2.0
stonesoft stonebeat_webcluster 2.5
stonesoft stonegate 1.5.17
stonesoft stonegate 1.5.18
stonesoft stonegate 1.6.2
stonesoft stonegate 1.6.3
stonesoft stonegate 1.7
stonesoft stonegate 1.7.1
stonesoft stonegate 1.7.2
stonesoft stonegate 2.0.1
stonesoft stonegate 2.0.4
stonesoft stonegate 2.0.5
stonesoft stonegate 2.0.6
stonesoft stonegate 2.0.7
stonesoft stonegate 2.0.8
stonesoft stonegate 2.0.9
stonesoft stonegate 2.1
stonesoft stonegate 2.2
stonesoft stonegate 2.2.1
stonesoft stonegate 2.2.4
stonesoft stonegate_vpn_client 1.7
stonesoft stonegate_vpn_client 1.7.2
stonesoft stonegate_vpn_client 2.0
stonesoft stonegate_vpn_client 2.0.7
stonesoft stonegate_vpn_client 2.0.8
stonesoft stonegate_vpn_client 2.0.9
tarantella tarantella_enterprise 3.20
tarantella tarantella_enterprise 3.30
tarantella tarantella_enterprise 3.40
vmware gsx_server 2.0
vmware gsx_server 2.0.1_build_2129
vmware gsx_server 2.5.1
vmware gsx_server 2.5.1_build_5336
vmware gsx_server 3.0_build_7592
avaya s8300 r2.0.0
avaya s8300 r2.0.1
avaya s8500 r2.0.0
avaya s8500 r2.0.1
avaya s8700 r2.0.0
avaya s8700 r2.0.1
bluecoat proxysg *
cisco call_manager *
cisco content_services_switch_11500 *
cisco gss_4480_global_site_selector *
cisco gss_4490_global_site_selector *
cisco mds_9000 *
cisco secure_content_accelerator 10000
securecomputing sidewinder 5.2
securecomputing sidewinder 5.2.0.01
securecomputing sidewinder 5.2.0.02
securecomputing sidewinder 5.2.0.03
securecomputing sidewinder 5.2.0.04
securecomputing sidewinder 5.2.1
securecomputing sidewinder 5.2.1.02
sun crypto_accelerator_4000 1.0
bluecoat cacheos_ca_sa 4.1.10
bluecoat cacheos_ca_sa 4.1.12
cisco pix_firewall_software 6.0
cisco pix_firewall_software 6.0\(1\)
cisco pix_firewall_software 6.0\(2\)
cisco pix_firewall_software 6.0\(3\)
cisco pix_firewall_software 6.0\(4\)
cisco pix_firewall_software 6.0\(4.101\)
cisco pix_firewall_software 6.1
cisco pix_firewall_software 6.1\(1\)
cisco pix_firewall_software 6.1\(2\)
cisco pix_firewall_software 6.1\(3\)
cisco pix_firewall_software 6.1\(4\)
cisco pix_firewall_software 6.1\(5\)
cisco pix_firewall_software 6.2
cisco pix_firewall_software 6.2\(1\)
cisco pix_firewall_software 6.2\(2\)
cisco pix_firewall_software 6.2\(3\)
cisco pix_firewall_software 6.2\(3.100\)
cisco pix_firewall_software 6.3
cisco pix_firewall_software 6.3\(1\)
cisco pix_firewall_software 6.3\(2\)
cisco pix_firewall_software 6.3\(3.102\)
cisco pix_firewall_software 6.3\(3.109\)



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CAFC15-178C-4176-9668-D4A04B63E77B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C8D6949-89F4-40EF-98F4-8D15628DC345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:firewall_services_module:1.1_\\(3.005\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F3DB2AEE-FB5C-42B7-845B-EDA3E58D5D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:firewall_services_module:2.1_\\(0.208\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "6479D85C-1A12-486D-818C-6679F415CA26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:aaa_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "287CF5FA-D0EC-4FD7-9718-973587EF34DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C88168D4-7DB5-4720-8640-400BB680D0FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:apache-based_web_server:2.0.43.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "968915A1-375B-4C69-BE11-9A393F7F1B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:symantec:clientless_vpn_gateway_4400:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "11465DCA-72E5-40E9-9D8E-B3CD470C47E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3954D0D1-9FDF-47D0-9710-D0FB06955B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6712BD-DE8F-40F5-AC74-B9EFE9A50CFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E586558A-ABC3-42EB-8B4D-DC92A0D695E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg200:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4C5F60-B32D-4D85-BA28-AE11972ED614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg200:4.31.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5935C3-3D83-461F-BC26-E03362115C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg203:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "80AC523B-3106-46F2-B760-803DCF8061F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg203:4.31.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B8D6F3-D15D-489F-A807-17E63F4831F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg208:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "808189BA-197F-49CE-933E-A728F395749C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg208:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32DCFA7B-7BBB-465A-A4AD-7E18EE3C02DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg5:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC7EF0CD-EA39-457B-8E2E-9120B65A5835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg5:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC2983F-5212-464B-AC21-8A897DEC1F58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:sg5:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF17989-D1F2-4B04-80BD-CFABDD482ABA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF2D00AC-FA2A-4C39-B796-DC19072862CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BCD1C5-1AFC-4287-9AFD-81FB3F4F9E54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
              "matchCriteriaId": "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "0D9F2B04-A1F2-4788-A53D-C8274A758DDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
              "matchCriteriaId": "9A5309ED-D84F-4F52-9864-5B0FEEEE5022",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
              "matchCriteriaId": "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "32310AFE-38CC-4C6C-AE13-54C18720F2C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC46909F-DDFC-448B-BCDF-1EB343F96630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9496279F-AB43-4B53-81A6-87C651ABC4BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
              "matchCriteriaId": "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
              "matchCriteriaId": "0EFE2E73-9536-41A9-B83B-0A06B54857F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E562907F-D915-4030-847A-3C6834A80D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "138985E6-5107-4E8B-A801-C3D5FE075227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E140F76-D078-4F58-89CF-3278CDCB9AF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9D76A8D-832B-411E-A458-186733C66010",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "580BA1FE-0826-47A7-8BD3-9225E0841EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "040B04CD-B891-4F19-A7CC-5C2D462FBD6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BF29685-7FFC-4093-A1D4-21E4871AF5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72872C9-63AF-417F-BFAE-92B4D350C006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "80BCF196-5E5A-4F31-BCE7-AA0C748CA922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "970939C5-1E6F-47B6-97E6-7B2C1E019985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD1F4148-E772-4708-8C1F-D67F969C11DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CEBCEF0-5982-4B30-8377-9CAC978A1CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
              "matchCriteriaId": "09458CD7-D430-4957-8506-FAB2A3E2AA65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
              "matchCriteriaId": "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:4d:webstar:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B87C95-4B34-4628-AD03-67D1DE13E097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:4d:webstar:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "758F95DB-E619-4B08-86FA-6CF2C1B0CBCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:4d:webstar:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F04471C-732F-44EE-AD1B-6305C1DD7DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:4d:webstar:5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3499913B-5DCD-4115-8C7B-9E8AFF79DE5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:4d:webstar:5.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E237919A-416B-4039-AAD2-7FAE1F4E100D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:4d:webstar:5.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "39149924-188C-40C1-B598-A9CD407C90DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:4d:webstar:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D5780C-4E29-4BCA-A47E-29FF6EAF33FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:4d:webstar:5.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6501108-5455-48FE-AA82-37AFA5D7EC24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*",
              "matchCriteriaId": "C1A3B951-A1F8-4291-82FA-AB7922D13ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:intuity_audix:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2E7C81-C0F5-4D36-9A23-03BE69295ED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:intuity_audix:s3210:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D0EF4A3-2FE5-41E4-A764-30B379ECF081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:intuity_audix:s3400:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCF6D59E-8AEA-4380-B86B-0803B2202F16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vsu:5:*:*:*:*:*:*:*",
              "matchCriteriaId": "140ABF28-FA39-4D77-AEB2-304962ED48C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vsu:5x:*:*:*:*:*:*:*",
              "matchCriteriaId": "09473DD9-5114-44C5-B56C-6630FBEBCACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vsu:100_r2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7ECD3A4-5A39-4222-8350-524F11D8FFB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vsu:500:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36C140D-E80C-479A-ADA7-18E901549059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vsu:2000_r2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "940712E9-B041-4B7F-BD02-7DD0AE596D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vsu:5000_r2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B887A2-9025-4C5B-8901-71BC63BF5293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vsu:7500_r2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "33264586-7160-4550-9FF9-4101D72F5C9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:avaya:vsu:10000_r2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5E6521-0611-4473-82AC-21655F10FEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*",
              "matchCriteriaId": "AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*",
              "matchCriteriaId": "8C83ABA2-87CD-429B-9800-590F8256B064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D9A576-2878-4AC4-AC95-E69CB8A84A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A1A0B02-CF33-401F-9AB2-D595E586C795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:next_generation_fp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C0EF3F0-B82E-45B7-8D05-05E76009F7A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "90FB3825-21A6-4DBE-8188-67672DBE01CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "80623E58-8B46-4559-89A4-C329AACF3CB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "AEE6C228-CD93-4636-868B-C19BC1674BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "A645148C-AD0D-46C1-BEE3-10F5C9066279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:provider-1:4.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "0D69187C-7F46-4FF0-A8A0-0E1989EA79BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE4A7EE-1BA3-46F1-BF4A-A72997EE0992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02029D75-FAF2-4842-9246-079C7DE36417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1:next_generation_fp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0146341-364C-4085-A2E1-BC8C260FBA3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:access_registrar:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8496E0D-2507-4C25-A122-0B846CBCA72A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E383F2A-DFCF-47F8-94EE-3563D41EA597",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:css_secure_content_accelerator:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2D87EF0-056E-4128-89EB-2803ED83DEE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:css_secure_content_accelerator:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB3163C1-2044-44DA-9C88-076D75FDF1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07E1B690-C58B-4C08-A757-F3DF451FDAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:okena_stormwatch:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F0E14C-7681-4D1A-B982-A51E450B93A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:threat_response:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF39E8B-C201-4940-81C9-14AF4C3DD4B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webns:6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC604680-2E9E-4DC4-ACDD-74D552A45BA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webns:6.10_b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A94436-D092-4C7E-B87B-63BC621EE82E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webns:7.1_0.1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "862165CF-3CFB-4C6E-8238-86FA85F243C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webns:7.1_0.2.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "056F3336-BAA8-4A03-90B4-7B31710FC1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webns:7.2_0.0.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FDC2510-FBB9-429A-B6D4-10AB11F93960",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webns:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D45127E-A544-40A0-9D34-BD70D95C9772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:webns:7.10_.0.06s:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C69C3E-C895-45C8-8182-7BB412A0C828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1FDD507-C38B-4C38-A54F-3DA6F07AD0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2B7AC2-CF08-4AC9-9A71-3A8130F9F9AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dell:bsafe_ssl-j:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4D9564B-B92E-4C97-87FF-B56D62DCA775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:wbem:a.01.05.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "B931D4F8-23F5-4ABA-A457-959995D30C58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:wbem:a.02.00.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE6A023E-9C2A-487F-B5CE-674C766BFE75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:wbem:a.02.00.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A15ACA2-D500-4260-B51A-6FE6AB5A45A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A045971-8756-47E8-9044-C39D08B36F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAA95881-7231-4FDA-AF73-04DF9FF0B64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B7F6AD-EDBD-4B09-BDB2-795ED114F2AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F045AB7B-1551-46E5-A5CC-BF13C1BB49F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44E85930-3AAD-420B-8E3E-AEC57344F6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52FD4485-BCA2-485A-A0CF-F8152C9DBFA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CF53BE4-FE2D-4D63-BD0F-A423D0FE3BE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00993464-BE09-4691-B3F0-51BBA9FB80C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.2_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "896AB39E-2078-4BA2-9522-477BD5F98FD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9279EC-47CF-45F1-B4CC-B2B332E82E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7300C3E-8105-4C23-89B9-7D29CED18C15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C59DB2-48DA-4172-A1F5-25CF3B5097AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "715F4E0B-7E4B-4520-A987-9B3ED3136B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lite:speed_technologies_litespeed_web_server:1.3_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CA1F606-C558-40FD-9300-6E2796F47BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A037FAA6-6D26-4496-BC67-03475B4D1155",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3831DD3-E783-4200-8986-FDBF7DD9BA53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "699764B6-0F86-4AB0-86A3-4F2E69AD820C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7562ADC4-0D01-4FC2-98F0-1F4041BDA52E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FAB588-BDBE-4A04-AB9E-4F700A3951F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B83F84-D1EF-43B4-8620-3C1BCCE44553",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "41169D2F-4F16-466A-82E9-AD0735472B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "947699C3-D9DE-411A-99C0-44ADD1D2223A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "15F668C0-8420-4401-AB0F-479575596CF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDDCC7B6-34CA-4551-9833-306B93E517BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "6D69C160-39F7-48B8-B9A3-CC86690453C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:imanager:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "166BF638-ABDC-4BB9-BD4E-2B22681AD9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:imanager:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA6420B-9F6A-48F4-A445-12B60A320347",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "180D07AE-C571-4DD6-837C-43E2A946007A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA3E4D2A-6488-4F8B-A3CA-4161A10FA4DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
              "matchCriteriaId": "90789533-C741-4B1C-A24B-2C77B9E4DE5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
              "matchCriteriaId": "1520065B-46D7-48A4-B9D0-5B49F690C5B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B76FE2D-FBE0-4A3B-A0EA-179332D74F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AA526B9-726A-49D5-B3CA-EBE2DA303CA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
              "matchCriteriaId": "494E48E7-EF86-4860-9A53-94F6C313746E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A518E8-21BE-4C5C-B425-410AB1208E9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9E3AB748-E463-445C-ABAB-4FEDDFD1878B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "660E4B8D-AABA-4520-BC4D-CF8E76E07C05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "85BFEED5-4941-41BB-93D1-CD5C2A41290E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E79A05-64F3-4397-952C-A5BB950C967D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F7C9E77-1EB2-4720-A8FD-23DC1C877D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
              "matchCriteriaId": "549BB01D-F322-4FE3-BDA2-4FEA8ED8568A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openssl:0.9.6-15:*:i386:*:*:*:*:*",
              "matchCriteriaId": "09F3FB7B-0F68-49F3-A3B7-977A687A42E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openssl:0.9.6b-3:*:i386:*:*:*:*:*",
              "matchCriteriaId": "088F2FF7-96E5-455E-A35B-D99F9854EC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386:*:*:*:*:*",
              "matchCriteriaId": "FFA721BF-1B2E-479F-BF25-02D441BF175B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_dev:*:*:*:*:*",
              "matchCriteriaId": "AFEDCE49-21CC-4168-818F-4C638EE3B077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openssl:0.9.7a-2:*:i386_perl:*:*:*:*:*",
              "matchCriteriaId": "B7D18F9B-C0BE-4DE8-81F4-5BF56C00BF41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26430687-409B-448F-934B-06AB937DDF63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "29DC217F-C257-4A3C-9CBD-08010C30BEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:servercluster:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F0F78F4-E81E-4C6B-AB73-D6AAE191060E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:servercluster:2.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1A5808-6D5D-48AD-9470-5A6510D17913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1E8990D-D9A0-4A71-9D87-EC047E01B0D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:1_3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBCC172-6867-4DFD-AAEF-9BDB4DA21F46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F2BEEA-46BB-4718-B0F3-B4EC62B678A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D09E11C-C5BB-409E-BB0D-7F351250419B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_fullcluster:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B06A05D-AA31-441D-9FC2-3558648C3B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0886901-6F93-44C1-B774-84D7E5D9554C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_securitycluster:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F203A80-7C1E-4A04-8E99-63525E176753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA0A204C-158B-4014-A53C-75E0CD63E0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonebeat_webcluster:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "085BA581-7DA5-4FA4-A888-351281FD0A7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:1.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1C4B3C-5701-4233-BA94-28915713F9C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:1.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "28D9F8D7-698A-486A-918A-7DB5CAFBB3CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D125C2A0-A4B5-48D6-A38A-54755C3FDF4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F85F672-0F21-4AD7-8620-13D82F2ECC22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "89070041-613A-4F7B-BD6A-C6091D21FC52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A71933-4BD5-4B11-8B14-D997E75F29CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B6BE11D-FC02-4950-A554-08CC9D8B1853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53FD0E1-9BAA-43F0-BCC9-0BE8D4356F55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80ADAE8-94D4-46A4-A5ED-FF134D808B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "69FA0221-5073-4D45-950F-119497B53FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AE5B43-7C90-4C2A-A215-30F5EC5841C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC1A110-B203-4962-8E1A-74BD98121AF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5A92C4D-B024-4D39-9479-409C39586F64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E0C4F5-CF02-4FF6-AE9B-5B6B70D5C067",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E8998CC-E372-46D0-8339-47DC8D92D253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF131FDC-BF8D-4A17-99F0-444EB900E83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "880811B3-E78E-456E-972E-DE733F368576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22411F18-2B93-405A-A3B5-2CF0A04977C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71188B7-E6DC-41E5-B619-367341113501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07491444-0196-4504-A971-A5E388B86BBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "72BC6CD2-3291-4E69-8DC6-F3AB853F8931",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD43EDDF-58A7-4705-B8C7-FD76C35A437D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C2E603-568F-40F6-9A7C-439E2A51B37F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:stonesoft:stonegate_vpn_client:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "703421A7-E8C5-450B-97EF-FD9D99D4B834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "9519BCB2-B401-44CE-97F6-847BB36AE45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBE573E8-DD94-4293-99AE-27B9067B3ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tarantella:tarantella_enterprise:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14413DA-5199-4282-9E22-D347E9D8E469",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:gsx_server:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "05CC5F49-0E9E-45D8-827D-A5940566DB25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:gsx_server:2.0.1_build_2129:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D94EE19-6CE9-4E02-8174-D9954CDBF02B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4E4BEE3-AE7B-4481-B724-2E644E18ACC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:gsx_server:2.5.1_build_5336:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAAB7052-E0B6-472E-920B-A0F0AEA25D6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:gsx_server:3.0_build_7592:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CE38F15-BD42-4171-8670-86AA8169A60C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "20C0BD87-CE4B-49D2-89BE-EF282C43AD72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3E6C4A8-59F4-43EE-8413-E95289037598",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE76357A-27E6-4D85-9AA0-1BB658C41568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C56C5FDB-24E2-479D-87CA-164CD28567D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6CFEC9-0F8F-4CD4-ABD1-E6533F910F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:call_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12DE5E22-DF93-46BE-85A3-D4E04379E901",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF28C435-C036-4507-8E3F-44E722F9974A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:gss_4480_global_site_selector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA957E2-ABF9-49B2-874F-3FC3060CE0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:gss_4490_global_site_selector:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2CDFE7-6853-4A31-85C0-50C57A8D606A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:secure_content_accelerator:10000:*:*:*:*:*:*:*",
              "matchCriteriaId": "408A9DB0-81EF-4186-B338-44954E67289B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B0C5F92-7E93-4C3F-B22B-E6612A4D3E10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0DC4B4-9AD9-4AC8-BFA7-A3D209B5D089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "303362A5-9C3C-4C85-8C97-2AB12CE01BF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED22DC1-E06B-4511-B920-6DAB792262D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.0.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE44CA7-4BC7-4C2B-948F-2ACABB91528B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F757B2A7-869F-4702-81EB-466317A79D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:securecomputing:sidewinder:5.2.1.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "01F6E9A9-6C85-48DA-BC61-55F8EACCB59F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:sun:crypto_accelerator_4000:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64AF1E33-4086-43E2-8F54-DA75A99D4B75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "53D16F03-A4C7-4497-AB74-499F208FF059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:bluecoat:cacheos_ca_sa:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "13A33EC1-836B-4C8C-AC18-B5BD4F90E612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "C558CED8-8342-46CB-9F52-580B626D320E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0F85D19E-6C26-429D-B876-F34238B9DAAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "09063867-0E64-4630-B35B-4CCA348E4DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F98CD7-A352-483C-9968-8FB2627A7CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "F97FE485-705F-4707-B6C6-0EF9E8A85D5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B925E8-D2C2-4E8C-AC21-0C422245C482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B9170562-872E-4C32-869C-B10FF35A925E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D0927A68-8BB2-4F03-8396-E9CACC158FC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "559DDBA3-2AF4-4A0C-B219-6779BA931F21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5226C9CC-6933-4F10-B426-B47782C606FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "757DAE9A-B25D-4B8A-A41B-66C2897B537E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3DC170-E279-4725-B9EE-6840B5685CC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8091EDA9-BD18-47F7-8CEC-E086238647C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F867890-74A4-4892-B99A-27DB4603B873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CE05B514-F094-4632-B25B-973F976F6409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "3392428D-1A85-4472-A276-C482A78E2CE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "40954985-16E6-4F37-B014-6A55166AE093",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0C097809-1FEF-4417-A201-42291CC29122",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n  do_change_cipher_spec en OpenSSL  0.9.6c hasta 0.9.6.k y 0.9.7a hasta 0.9.7c permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (ca\u00edda) mediante una h\u00e1bil uni\u00f3n SSL/TLS que provoca un puntero nulo."
    }
  ],
  "id": "CVE-2004-0079",
  "lastModified": "2025-01-16T18:15:19.483",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2004-11-23T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://docs.info.apple.com/article.html?artnum=61798"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/11139"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/17381"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/17398"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/17401"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/18247"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://support.lexmark.com/index?page=content\u0026id=TE88\u0026locale=EN\u0026userlocale=EN_US"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-465"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/288574"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.openssl.org/news/secadv_20040317.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-829.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-830.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9899"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.trustix.org/errata/2004/0012"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://docs.info.apple.com/article.html?artnum=61798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=107953412903636\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=108403806509920\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/11139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/17381"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/17398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/17401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/18247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://support.lexmark.com/index?page=content\u0026id=TE88\u0026locale=EN\u0026userlocale=EN_US"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/288574"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.openssl.org/news/secadv_20040317.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-829.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2005-830.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9899"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.slackware.org/security/viewer.php?l=slackware-security\u0026y=2004\u0026m=slackware-security.455961"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.trustix.org/errata/2004/0012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.",
      "lastModified": "2007-03-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.